Wireless mesh network

Last updated
Diagram showing a possible configuration for a wired-wireless mesh network, connected upstream via a VSAT link (click to enlarge) Wireless mesh network diagram.jpg
Diagram showing a possible configuration for a wired–wireless mesh network, connected upstream via a VSAT link (click to enlarge)

A wireless mesh network (WMN) is a communications network made up of radio nodes organized in a mesh topology. It can also be a form of wireless ad hoc network. [1]

Contents

A mesh refers to rich interconnection among devices or nodes. Wireless mesh networks often consist of mesh clients, mesh routers and gateways. Mobility of nodes is less frequent. If nodes constantly or frequently move, the mesh spends more time updating routes than delivering data. In a wireless mesh network, topology tends to be more static, so that routes computation can converge and delivery of data to their destinations can occur. Hence, this is a low-mobility centralized form of wireless ad hoc network. Also, because it sometimes relies on static nodes to act as gateways, it is not a truly all-wireless ad hoc network.[ citation needed ]

Mesh clients are often laptops, cell phones, and other wireless devices. Mesh routers forward traffic to and from the gateways, which may or may not be connected to the Internet. The coverage area of all radio nodes working as a single network is sometimes called a mesh cloud. Access to this mesh cloud depends on the radio nodes working together to create a radio network. A mesh network is reliable and offers redundancy. When one node can no longer operate, the rest of the nodes can still communicate with each other, directly or through one or more intermediate nodes. Wireless mesh networks can self form and self heal. Wireless mesh networks work with different wireless technologies including 802.11, 802.15, 802.16, cellular technologies and need not be restricted to any one technology or protocol.

History

Wireless mesh radio networks were originally developed for military applications, such that every node could dynamically serve as a router for every other node. In that way, even in the event of a failure of some nodes, the remaining nodes could continue to communicate with each other, and, if necessary, serve as uplinks for the other nodes.

Early wireless mesh network nodes had a single half-duplex radio that, at any one instant, could either transmit or receive, but not both at the same time. This was accompanied by the development of shared mesh networks. This was subsequently superseded by more complex radio hardware that could receive packets from an upstream node and transmit packets to a downstream node simultaneously (on a different frequency or a different CDMA channel). This allowed the development of switched mesh networks. As the size, cost, and power requirements of radios declined further, nodes could be cost-effectively equipped with multiple radios. This, in turn, permitted each radio to handle a different function, for instance, one radio for client access, and another for backhaul services.

Work in this field has been aided by the use of game theory methods to analyze strategies for the allocation of resources and routing of packets. [2] [3] [4]

Features

Architecture

Wireless mesh architecture is a first step towards providing cost effective and low mobility over a specific coverage area. Wireless mesh infrastructure is, in effect, a network of routers minus the cabling between nodes. It is built of peer radio devices that do not have to be cabled to a wired port like traditional WLAN access points (AP) do. Mesh infrastructure carries data over large distances by splitting the distance into a series of short hops. Intermediate nodes not only boost the signal, but cooperatively pass data from point A to point B by making forwarding decisions based on their knowledge of the network, i.e. perform routing by first deriving the topology of the network.

Wireless mesh networks is a relatively "stable-topology" network except for the occasional failure of nodes or addition of new nodes. The path of traffic, being aggregated from a large number of end users, changes infrequently. Practically all the traffic in an infrastructure mesh network is either forwarded to or from a gateway, while in wireless ad hoc networks or client mesh networks the traffic flows between arbitrary pairs of nodes. [5]

If rate of mobility among nodes are high, i.e., link breaks happen frequently, wireless mesh networks start to break down and have low communication performance. [6]

Management

This type of infrastructure can be decentralized (with no central server) or centrally managed (with a central server). [7] Both are relatively inexpensive, and can be very reliable and resilient, as each node needs only transmit as far as the next node. Nodes act as routers to transmit data from nearby nodes to peers that are too far away to reach in a single hop, resulting in a network that can span larger distances. The topology of a mesh network must be relatively stable, i.e., not too much mobility. If one node drops out of the network, due to hardware failure or any other reason, its neighbors can quickly find another route using a routing protocol.

Applications

Mesh networks may involve either fixed or mobile devices. The solutions are as diverse as communication needs, for example in difficult environments such as emergency situations, tunnels, oil rigs, battlefield surveillance, high-speed mobile-video applications on board public transport, real-time racing-car telemetry, or self-organizing Internet access for communities. [8] An important possible application for wireless mesh networks is VoIP. By using a quality of service scheme, the wireless mesh may support routing local telephone calls through the mesh. Most applications in wireless mesh networks are similar to those in wireless ad hoc networks.

Some current applications:

Operation

The principle is similar to the way packets travel around the wired Internet – data hops from one device to another until it eventually reaches its destination. Dynamic routing algorithms implemented in each device allow this to happen. To implement such dynamic routing protocols, each device needs to communicate routing information to other devices in the network. Each device then determines what to do with the data it receives – either pass it on to the next device or keep it, depending on the protocol. The routing algorithm used should attempt to always ensure that the data takes the most appropriate (fastest) route to its destination.

Multi-radio mesh

Multi-radio mesh refers to having different radios operating at different frequencies to interconnect nodes in a mesh. This means there is a unique frequency used for each wireless hop and thus a dedicated CSMA collision domain. With more radio bands, communication throughput is likely to increase as a result of more available communication channels. This is similar to providing dual or multiple radio paths to transmit and receive data.

Research topics

One of the more often cited papers on wireless mesh networks identified the following areas as open research problems in 2005:

Examples

A number of wireless community networks have been started as grassroots projects across the world at various points in time.

Other projects, often proprietary or tied to a single institution, are:

Protocols

Routing protocols

There are more than 70 competing schemes for routing packets across mesh networks. Some of these include:

The IEEE has developed a set of standards under the title 802.11s.

A less thorough list can be found at list of ad hoc routing protocols.

Autoconfiguration protocols

Standard autoconfiguration protocols, such as DHCP or IPv6 stateless autoconfiguration may be used over mesh networks.

Mesh network specific autoconfiguration protocols include:

Communities and providers

See also

Related Research Articles

<span class="mw-page-title-main">Wireless LAN</span> Computer network that links devices using wireless communication within a limited area

A wireless LAN (WLAN) is a wireless computer network that links two or more devices using wireless communication to form a local area network (LAN) within a limited area such as a home, school, computer laboratory, campus, or office building. This gives users the ability to move around within the area and remain connected to the network. Through a gateway, a WLAN can also provide a connection to the wider Internet.

<span class="mw-page-title-main">Wireless network</span> Computer network not fully connected by cables

A wireless network is a computer network that uses wireless data connections between network nodes. Wireless networking allows homes, telecommunications networks and business installations to avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. Admin telecommunications networks are generally implemented and administered using radio communication. This implementation takes place at the physical level (layer) of the OSI model network structure.

<span class="mw-page-title-main">Wireless community network</span>

Wireless community networks or wireless community projects or simply community networks, are non-centralized, self-managed and collaborative networks organized in a grassroots fashion by communities, non-governmental organizations and cooperatives in order to provide a viable alternative to municipal wireless networks for consumers.

<span class="mw-page-title-main">Wi-Fi</span> Wireless local area network

Wi-Fi is a family of wireless network protocols based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access, allowing nearby digital devices to exchange data by radio waves. These are the most widely used computer networks, used globally in home and small office networks to link devices and to provide Internet access with wireless routers and wireless access points in public places such as coffee shops, hotels, libraries, and airports.

<span class="mw-page-title-main">Wireless access point</span> Device that allows wireless devices to connect to a wired network

In computer networking, a wireless access point (WAP) is a networking hardware device that allows other Wi-Fi devices to connect to a wired network or wireless network. As a standalone device, the AP may have a wired or wireless connection to a switch or router, but in a wireless router it can also be an integral component of the networking device itself. An WAP and AP is differentiated from a hotspot, which can be a physical location or digital location where Wi-Fi or WAP access is available.

Zigbee is an IEEE 802.15.4-based specification for a suite of high-level communication protocols used to create personal area networks with small, low-power digital radios, such as for home automation, medical device data collection, and other low-power low-bandwidth needs, designed for small scale projects which need wireless connection. Hence, Zigbee is a low-power, low-data-rate, and close proximity wireless ad hoc network.

<span class="mw-page-title-main">Hidden node problem</span> Problem in wireless networking

In wireless networking, the hidden node problem or hidden terminal problem occurs when a node can communicate with a wireless access point (AP), but cannot directly communicate with other nodes that are communicating with that AP. This leads to difficulties in medium access control sublayer since multiple nodes can send data packets to the AP simultaneously, which creates interference at the AP resulting in no packet getting through.

<span class="mw-page-title-main">Service set (802.11 network)</span> Group of all devices on the same wireless network

In IEEE 802.11 wireless local area networking standards, a service set is a group of wireless network devices which share a service set identifier (SSID)—typically the natural language label that users see as a network name. A service set forms a logical network of nodes operating with shared link-layer networking parameters; they form one logical network segment.

<span class="mw-page-title-main">Wi-Fi Alliance</span> Non-profit organization that owns the Wi-Fi trademark

The Wi-Fi Alliance is a non-profit organization that owns the Wi-Fi trademark. Manufacturers may use the trademark to brand products certified for Wi-Fi interoperability. It is based in Austin, Texas.

<span class="mw-page-title-main">Optimized Link State Routing Protocol</span> IP routing protocol optimized for mobile ad hoc networks

The Optimized Link State Routing Protocol (OLSR) is an IP routing protocol optimized for mobile ad hoc networks, which can also be used on other wireless ad hoc networks. OLSR is a proactive link-state routing protocol, which uses hello and topology control (TC) messages to discover and then disseminate link state information throughout the mobile ad hoc network. Individual nodes use this topology information to compute next hop destinations for all nodes in the network using shortest hop forwarding paths.

<span class="mw-page-title-main">Wireless network interface controller</span> Hardware component that connects a computer to a wireless computer network

A wireless network interface controller (WNIC) is a network interface controller which connects to a wireless network, such as Wi-Fi, Bluetooth, or LTE (4G) or 5G rather than a wired network, such as an Ethernet network. A WNIC, just like other NICs, works on the layers 1 and 2 of the OSI model and uses an antenna to communicate via radio waves.

<span class="mw-page-title-main">Wireless security</span> Aspect of wireless networks

Wireless security is the prevention of unauthorized access or damage to computers or data using wireless networks, which include Wi-Fi networks. The term may also refer to the protection of the wireless network itself from adversaries seeking to damage the confidentiality, integrity, or availability of the network. The most common type is Wi-Fi security, which includes Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is an old IEEE 802.11 standard from 1997. It is a notoriously weak security standard: the password it uses can often be cracked in a few minutes with a basic laptop computer and widely available software tools. WEP was superseded in 2003 by WPA, a quick alternative at the time to improve security over WEP. The current standard is WPA2; some hardware cannot support WPA2 without firmware upgrade or replacement. WPA2 uses an encryption device that encrypts the network with a 256-bit key; the longer key length improves security over WEP. Enterprises often enforce security using a certificate-based system to authenticate the connecting device, following the standard 802.11X.

In a hierarchical telecommunications network, the backhaul portion of the network comprises the intermediate links between the core network, or backbone network, and the small subnetworks at the edge of the network.

6LoWPAN was a working group of the Internet Engineering Task Force (IETF). It was created with the intention of applying the Internet Protocol (IP) even to the smallest devices, enabling low-power devices with limited processing capabilities to participate in the Internet of Things.

Roofnet was an experimental 802.11b/g mesh network developed by the Computer Science and Artificial Intelligence Laboratory at the Massachusetts Institute of Technology (MIT). Research included link-level measurements of 802.11, finding high-throughput routes in the face of lossy links, link adaptation, and developing new protocols which take advantage of radio’s unique properties (ExOR). The software developed for this project is available free as open source.

A wireless ad hoc network (WANET) or mobile ad hoc network (MANET) is a decentralized type of wireless network. The network is ad hoc because it does not rely on a pre-existing infrastructure, such as routers or wireless access points. Instead, each node participates in routing by forwarding data for other nodes. The determination of which nodes forward data is made dynamically on the basis of network connectivity and the routing algorithm in use.

A wide variety of different wireless data technologies exist, some in direct competition with one another, others designed for specific applications. Wireless technologies can be evaluated by a variety of different metrics of which some are described in this entry.

Extremely Opportunistic Routing (ExOR) is a combination of routing protocol and media access control for a wireless ad hoc network, invented by Sanjit Biswas and Robert Morris of the MIT Artificial Intelligence Laboratory, and described in a 2005 paper. A very similar opportunistic routing scheme was also independently proposed by Zhenzhen Ye and Yingbo Hua from University of California, Riverside and presented in a paper in 2005. Previously open source, ExOR was available in 2005 but is no longer obtainable. The broadcast and retransmission strategies used by the algorithm were already described in the literature. ExOR is valuable because it can operate available digital radios to use some previously impractical algorithmic optimizations.

IEEE 802.11s is a wireless local area network (WLAN) standard and an IEEE 802.11 amendment for mesh networking, defining how wireless devices can interconnect to create a wireless LAN mesh network, which may be used for relatively fixed topologies and wireless ad hoc networks. The IEEE 802.11s task group drew upon volunteers from university and industry to provide specifications and possible design solutions for wireless mesh networking. As a standard, the document was iterated and revised many times prior to finalization.

Smartphone ad hoc networks are wireless ad hoc networks that use smartphones. Once embedded with ad hoc networking technology, a group of smartphones in close proximity can together create an ad hoc network. Smart phone ad hoc networks use the existing hardware in commercially available smartphones to create peer-to-peer networks without relying on cellular carrier networks, wireless access points, or traditional network infrastructure. Wi-Fi SPANs use the mechanism behind Wi-Fi ad-hoc mode, which allows phones to talk directly among each other, through a transparent neighbor and route discovery mechanism. SPANs differ from traditional hub and spoke networks, such as Wi-Fi Direct, in that they support multi-hop routing and relays and there is no notion of a group leader, so peers can join and leave at will without destroying the network.

References

  1. 1 2 Chai Keong Toh Ad Hoc Mobile Wireless Networks, Prentice Hall Publishers, 2002. ISBN   978-0-13-007817-9
  2. Huang, J.; Palomar, D. P.; Mandayam, N.; Walrand, J.; Wicker, S. B.; Basar, T. (2008). "Game Theory in Communication Systems" (PDF). IEEE Journal on Selected Areas in Communications. 26 (7): 1042–1046. doi:10.1109/jsac.2008.080902. S2CID   5900981. Archived from the original (PDF) on 2011-07-20.
  3. Cagalj, M.; Ganeriwal, S.; Aad, I.; Hubaux, J.-P. (2005). "On selfish behavior in CSMA/CA networks". Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies (PDF). Vol. 4. pp. 2513–2524. doi:10.1109/INFCOM.2005.1498536. ISBN   0-7803-8968-9. S2CID   7243361.
  4. Shi, Zhefu; Beard, Cory; Mitchell, Ken (2011). "Competition, cooperation, and optimization in Multi-Hop CSMA networks". Proceedings of the 8th ACM Symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks. pp. 117–120. doi:10.1145/2069063.2069084. ISBN   9781450309004. S2CID   519792.
  5. J. Jun, M.L. Sichitiu, "The nominal capacity of wireless mesh networks" Archived 2008-07-04 at the Wayback Machine , in IEEE Wireless Communications, vol 10, 5 pp 8-14. October 2003
  6. Wireless Communications, Networking and Applications: Proceedings of WCNA 2014.
  7. Cheng, Shin-Ming; Lin, Phone; Huang, Di-Wei; Yang, Shun-Ren (July 2006). "A study on distributed/Centralized scheduling for wireless mesh network". Proceedings of the 2006 international conference on Wireless communications and mobile computing. pp. 599–604. doi:10.1145/1143549.1143668. ISBN   1595933069. S2CID   8584989.
  8. Beyer, Dave; Vestrich, Mark; Garcia-Luna-Aceves, Jose (1999). "The Rooftop Community Network: Free High-Speed Network Access for Communities". In Hurley, D.; Keller, J. (eds.). The First 100 Feet . MIT Press. pp.  75–91. ISBN   0-262-58160-4.
  9. "ZigBee.org Smart Energy Overview". Archived from the original on 2011-03-15. Retrieved 2011-03-04.
  10. Hildenbrand, Jerry (13 October 2016). "How Wi-Fi mesh networks work". Android Central.
  11. Fleishman, Glenn (May 5, 2020). "Wireless mesh networks: Everything you need to know". PCWorld. Retrieved 2018-10-09.
  12. "Iridium Communications Network and Satellite Coverage". Roadpost USA. Retrieved 2022-06-01.
  13. Pathak, P. H.; Dutta, R. (2011). "A Survey of Network Design Problems and Joint Design Approaches in Wireless Mesh Networks". IEEE Communications Surveys & Tutorials. 13 (3): 396–428. doi:10.1109/SURV.2011.060710.00062. S2CID   206583549.
  14. Kawadia, V.; Kumar, P.R. (2005). "A cautionary perspective on cross-layer design". IEEE Wireless Communications. 12 (1): 3–11. doi:10.1109/MWC.2005.1404568. ISSN   1536-1284. S2CID   1303663.
  15. Abolhasan, Mehran; Lipman, Justin; Ni, Wei; Hagelstein, Brett (July 2015). "Software-defined wireless networking: centralized, distributed, or hybrid?". IEEE Network. 29 (4): 32–38. doi:10.1109/MNET.2015.7166188. ISSN   0890-8044. S2CID   1133260.
  16. Alanazi, Shaker; Saleem, Kashif; Al-Muhtadi, Jalal; Derhab, Abdelouahid (2016). "Analysis of Denial of Service Impact on Data Routing in Mobile eHealth Wireless Mesh Network". Mobile Information Systems. 2016: 1–19. doi: 10.1155/2016/4853924 . ISSN   1574-017X.
  17. "C. Toh, Mobile Computing - Network without infrastructures, 1999" (PDF). Archived (PDF) from the original on 2017-10-23.
  18. Toh, C. -K; Chen, Richard; Delwar, Minar; Allen, Donald (December 2000). "C. Toh - Experimenting with an Ad Hoc wireless network on campus: insights and experiences, ACM SIGMETRICS Review, 2000". ACM SIGMETRICS Performance Evaluation Review. 28 (3): 21–29. doi:10.1145/377616.377622. S2CID   1486812.
  19. "B. Brewin - JTRS Shuts Down". August 2012. Archived from the original on 2017-03-16.
  20. ""Everyone is a node: How Wi-Fi Mesh Networking work by Jerry Hildenbrand, 2016". Archived from the original on 2017-08-04. Retrieved 2017-05-11.
  21. "Next-Generation Tactical Ad Hoc Mobile Wireless Networks, TRW Technology Review Journal, 2004". Archived from the original on 2016-11-26.
  22. "Meraki Mesh". meraki.com. Archived from the original on 2008-02-19. Retrieved 2008-02-23.
  23. "Muni WiFi Mesh Networks". belairnetworks.com. Archived from the original on 2008-03-02. Retrieved 2008-02-23.
  24. Robert Lee Lounsbury Jr. "Optimum Antenna Configuration for Maximizing Access Point Range of an IEEE 802.11 Wireless Mesh Network in Support of Multimission Operations Relative to Hastily Formed Scalable Deployments" (PDF). Archived from the original (PDF) on April 10, 2011. Retrieved 2008-02-23.
  25. "Disruption Tolerant Mesh Networks" (PDF). Archived (PDF) from the original on 2017-05-17.
  26. "XO-1 Mesh Network Details". laptop.org. Archived from the original on 2008-03-05. Retrieved 2008-02-23.
  27. "SONbuddy : Network without Network". sonbuddy.com. Archived from the original on 2008-02-18. Retrieved 2008-02-23.
  28. "Cambridge Strawberry Fair". cambridgeshiretouristguide.com. Archived from the original on 2008-02-23. Retrieved 2008-02-23.
  29. www.broadband-hamnet.org
  30. "Broadband-Hamnet wins International Association of Emergency Managers Awards". ARRL. Archived from the original on 2015-07-03. Retrieved 2015-05-02.
  31. "Wireless Networking Group". Archived from the original on 2009-03-28.
  32. "Wireless Networking Group" (PDF). Archived from the original (PDF) on 2011-07-19.
  33. "SMesh". smesh.org. Archived from the original on 2008-02-22. Retrieved 2008-02-23.
  34. "SolarMesh". mcmaster.ca. Archived from the original on 2007-11-02. Retrieved 2008-04-15.
  35. Terence D. Todd, Amir A. Sayegh, Mohammed N. Smadi, and Dongmei Zhao. The Need for Access Point Power Saving in Solar Powered WLAN Mesh Networks . In IEEE Network, May/June 2008.
  36. http://www.wing-project.org Archived 2008-11-13 at the Wayback Machine WING
  37. "Broadband internet for everyone". eurekalert.org. Archived from the original on 2013-06-05. Retrieved 2012-02-16.
  38. Lee, Y. J.; Riley, G. F. (March 2005). "Dynamic NIx-vector routing for mobile ad hoc networks". IEEE Wireless Communications and Networking Conference, 2005. Vol. 4. pp. 1995–2001 Vol. 4. doi:10.1109/WCNC.2005.1424825. hdl: 1853/12289 . ISBN   0-7803-8966-2. S2CID   2648870.
  39. Porto, D. C. F.; Cavalcanti, G.; Elias, G. (1 April 2009). "A Layered Routing Architecture for Infrastructure Wireless Mesh Networks". 2009 Fifth International Conference on Networking and Services (PDF). pp. 366–369. doi:10.1109/ICNS.2009.91. ISBN   978-1-4244-3688-0. S2CID   16444897.
  40. "TropOS is field-proven for creating scalable network architecture - TropOS Technology | Unified Network Management (Wireless Mesh Network Communication Solutions | ABB Wireless)". new.abb.com. Retrieved 2019-12-19.