-
Notifications
You must be signed in to change notification settings - Fork 54
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fast path changes #45
Comments
You can try to use net_traversal_jiffies to limit this. But please check whether this patch is available: If yes, maybe you can try to revert this and see how. |
It seems that the patch is available. Even so, shouldn't the mesh path selection algorithm consider other responses before deciding? (without reverting) |
I'd have to reread what the standard says on this -- but yes, the code as currently written will take the first response, and then any after that which have a better metric, for any given path refresh. So this implies a path swap if the first response is not the best. So, supposing we do something different here, I guess we'd need to buffer the responses for some amount of time before committing to one. |
I thought that the introduction of net_traversal_jiffies is mainly for On Sat, Nov 28, 2015 at 5:32 AM, Bob Copeland notifications@github.com
|
On Fri, Nov 27, 2015 at 05:42:19PM -0800, Chun-Yeow wrote:
According to the standard there are two uses of net_traversal_jiffies
#2 is what we are doing in PREQ response, but it just means we send
That will happen as soon as we get the PREP. The standard doesn't say Bob Copeland %% http://bobcopeland.com/ |
I went through this paper "A joint experimental and simulation study of the IEEE 802.11s HWMP protocol and airtime link metric" and it did mention that the original feature (without Bob's patch) is as optional in one of the early IEEE 802.11s drafts by open80211s. This paper did recommend few approaches to improve this. Maybe it is good to take a look. |
I am trying to form the mesh network using SAE authentication in a very busy channel (channel 6 - 2437 Mhz). But still the authentication time (calculated from time stamps of wpa_supplicant) is not affected because of the channel being busy. It takes the same time compared to the authentication time when the channel was free (near by access points, routers, other devices were all off). How is this possible?? Even if the channel is heavily loaded with network traffic, the authentication time required for new node to become part of MBSS is still unaffected ?? Any reason for that? Please help me in clearing this doubt of mine. Thanks and Regards, |
@sritam2 :I believe it is because the Management/Control packets have higher priority than Data packets. Eg. Ath9k supports 10 queues and data packets use Q0 which is lowest priority. This makes Mgt/Ctl packets have higher chance to be sent both inside chip and in he air, by DCF mechanism. |
Hi,
I have noticed that if I have an MP that has sent a PREQ to two other MP's then the following will happen:
This created a situation where for each path selection I see a jitter in the TP because of the constant path changes.
Is this how the mesh should work? Or is there some setting that can prevent this situation?
Best Regards
The text was updated successfully, but these errors were encountered: