Wireless mesh network auto-forming in a multi-tenant environment

ABSTRACT

A wireless mesh access point (AP) determines a candidate set of Basic Service Set Identifiers (BSSIDs) or other unique identifiers by monitoring for detection of a set of wireless communications, each bearing a unique identifier. The AP selects a candidate unique identifier from the candidate set. The AP establishes a wireless communication link with a controller of a wireless mesh network associated with the candidate unique identifier. The AP transmits a request to the controller to join the wireless mesh network associated with the candidate unique identifier. The AP receives a response from the controller indicating either acceptance or rejection of the request. If the response indicates rejection, the AP rejects one or more unique identifiers in the candidate set in response to reason information included in the rejection.

BACKGROUND

A wireless network is a digital communications network that allows awireless network device to communicate with or access a computer networkvia a radio communication link. For a number of years, the most commontype of wireless network has been that which is commonly referred to as“WiFi” or “802.11,” the latter term in reference to the IEEE 802.11 setof standards that govern such networks. Such an 802.11 network comprisesone or more access points (APs) that are each connected by a wiredconnection with a router or similar networking device. The router orother such networking device allows a client device, such as a portablecomputer, smartphone, etc., to communicate with or access a computernetwork. It is common for the networking device to provide the clientdevice with a connection to the Internet.

In public areas, such as airports, shopping malls, multi-unit buildings,etc., such a networking device may have more than one tenant. The term“controller” is used herein to refer to such a multi-tenant networkingdevice. The term “tenant” in this context refers to a system thatcontrols a wireless mesh network in an environment in which two or moresuch wireless mesh networks share the same controller.

A wireless mesh network is a digital communications network comprisingAPs organized in a mesh topology, where each AP can communicate viaradio communication links in a peer-to-peer manner with other such APsin the network. Each AP can receive a message from another (peer) AP andforward or relay the message to still another (peer) AP. The messagereaches its ultimate destination via one or more such relays or “hops”as they are commonly referred to in the art. In a client-servercomputing system, the source and destination of a message is generally aclient device or a server device. Wireless mesh networks providenumerous benefits over other types of wireless networks, includingredundancy. For example, if a wireless mesh AP is removed from operationin the network, it may still be possible for messages that would havebeen routed via that AP to reach their destinations via alternativeroutes. A route through the wireless mesh network between an AP and thecontroller via one or more hops can be referred to as an uplink.Wireless mesh networks can employ radio technology and protocols thatare similar to those employed in non-mesh wireless networks, such asthose governed by IEEE 802.11. A set of standards known as IEEE 802.11srelates more specifically to wireless mesh networks and is an extensionof the IEEE 802.11 set of standards.

A subset of wireless mesh APs in a network may also be wireless meshportal APs. A wireless mesh portal AP not only can communicate viawireless communication links with peers but also can communicate via awired connection with, for example, the controller. The controller canserve as a gateway to a computer network, such as the Internet.

To install a wireless mesh network, a system administrator or similarperson (referred to herein for convenience as a “user”) commonly firstdetermines the network topology, i.e., the spatial positions in whicheach wireless mesh AP is to be placed relative to its peers. The userthen configures each wireless mesh AP with information that enables itto connect to the wireless mesh network. For example, each wireless meshAP must be provided with the service set identifier (SSID) of thewireless mesh network. The user then plugs the one or more wireless meshAPs that are portals into a wired network, and positions the remainingwireless mesh APs.

The above-described method for installing a wireless mesh networkrequires that the user possess substantial technical knowledge ofwireless mesh networking and provide substantial physical interactionwith the wireless mesh APs. It would be desirable to provide a systemand method in which less interaction with the user is required to formor install a wireless mesh network.

SUMMARY

Embodiments of the invention relate to a system, method, and computerprogram product for operation of a wireless mesh access point in amanner that enables the wireless mesh access point to join a wirelessmesh network. In an exemplary embodiment, the wireless mesh access pointdetermines a candidate set of one or more unique identifiers bymonitoring for detection of a set of one or more wirelesscommunications, each bearing a unique identifier. The wireless meshaccess point then selects a candidate unique identifier from thecandidate set. The wireless mesh access point establishes a wirelesscommunication link with a controller of a wireless mesh networkassociated with the candidate unique identifier. Then, the wireless meshaccess point transmits a request to the controller to join the wirelessmesh network associated with the candidate unique identifier. Thewireless mesh access point receives a response from the controllerindicating either acceptance of the request or a rejection of therequest. In an instance in which the response includes a rejection ofthe request, the rejection of the request includes reason information.If the response includes a rejection, the wireless mesh access pointrejects one or more unique identifiers in the candidate set of one ormore unique identifiers in response to the reason information includedin a rejection of the request. The wireless mesh access point thenselects another candidate unique identifier from among the remainingunique identifiers in the candidate set and repeats the foregoingmethod.

Other systems, methods, features, and advantages will be or becomeapparent to one with skill in the art upon examination of the followingfigures and detailed description. It is intended that all suchadditional systems, methods, features, and advantages be included withinthis description, be within the scope of the specification, and beprotected by the accompanying claims.

BRIEF DESCRIPTION OF THE DRAWINGS

The invention can be better understood with reference to the followingdrawings. The components in the drawings are not necessarily to scale,emphasis instead being placed upon clearly illustrating the principlesof the present invention.

FIG. 1 is a block diagram of an exemplary wireless mesh network.

FIG. 2A is a flow diagram illustrating an exemplary method of operationof an exemplary wireless mesh access point in the wireless mesh networkof FIG. 1.

FIG. 2B is a continuation of the flow diagram of FIG. 2A.

FIG. 3 is a block diagram of an exemplary wireless mesh access point ofthe wireless mesh network of FIG. 1.

DETAILED DESCRIPTION

As illustrated in FIG. 1, in an illustrative or exemplary embodiment ofthe invention, a wireless mesh network 10 includes a plurality ofwireless mesh access points (APs) 12, 14, 16, 18, etc. Although forillustrative purposes only these four exemplary APs 12-18 are shown,wireless mesh network 10 can have any number of such wireless mesh APs.As well understood by persons skilled in the art, the exemplary APs12-18 are arranged in a mesh topology. That is, each of APs 12-18, whenproperly configured, can communicate via a wireless communication linkwith at least one other of APs 12-18. Whether a particular one of APs12-18 can establish a wireless communication link with anotherparticular one other of APs 12-18 depends upon whether they are withinradio reception range of each other and how they are configured. Thespatial arrangement of APs 12-18 shown in FIG. 1 is intended merely tobe illustrative, as each of APs 12-18 can be located in any suitableposition relative to the others. Those of APs 12-18 that can establishwireless communication links with each other are referred to as peers.For example: AP 12 and AP 14 are peers because they can establish andcommunicate with each other via a wireless communication link 20; AP 12and AP 16 are peers because they can establish and communicate with eachother via a wireless communication link 22; and AP 16 and AP 18 arepeers because they can establish and communicate with each other via awireless communication link 24.

While APs 12-18 can only communicate with each other via wirelesscommunication links 20-24, AP 12 can also communicate via a wiredcommunication link 26 because it is a wireless mesh portal AP. In theexemplary embodiment, wired communication link 26 connects AP 12 with acontroller 28. Controller 28 serves as a gateway connecting wirelessmesh network 10 to one or more other networks (not shown), such as theInternet.

Although only wireless mesh network 10 is shown for purposes of clarity,it should be understood that other such wireless mesh networks may bepresent in proximity to wireless mesh network 10. Each such otherwireless mesh network may include a controller similar to controller 28and one or more APs similar to APs 12-18. It should also be understoodthat controller 28 or the controllers of other wireless mesh networks inproximity to wireless mesh network 10 may host multiple tenants. Thatis, controller 28 may control additional APs (not shown for purposes ofclarity) other than the illustrated APs 12-18.

The flow diagram of FIGS. 2A-2B illustrates an exemplary method by whicheach of APs 12-18 can operate in network 10. As described below, in theexemplary embodiment the method can occur when any one of APs 12-18 isnewly installed in position in network 10 and power is applied to it.For convenience, the description below refers to the newly installed oneof APs 12-18 as an “exemplary AP” 60 (described in further detail belowwith regard to FIG. 3). A goal of the method is for the exemplary AP 60to determine the information needed to properly establish an uplink withcontroller 28. Such information includes a Basic Service Set Identifier(BSSID) as well as controller and tenant information. As described infurther detail below, criteria for selecting a BSSID can include, forexample, whether a BSSID is associated with a license for the exemplaryAP 60, and whether a BSSID is associated with the same tenant as theexemplary AP 60.

The selected BSSID will uniquely identify an AP through which exemplaryAP 60 can establish an uplink with controller 28, as a BSSID is formedin part from an AP's unique Media Access Control (MAC) address. In aninstance in which an AP has more than one radio transceiver, the AP canhave a BSSID for each transceiver. In contrast with a BSSID, an SSIDdoes not uniquely identify an AP but rather identifies a network fromthe perspective of users, i.e., a “user network.” An SSID may becolloquially referred to as “the name of the network” and is commonly ahuman-readable string. In some instances, a wireless mesh network cansupport more than one user network. For example, a network operated onthe premises of a business may support a first network named “BUSINESS”for use by employees of the business and a second network named “GUEST”for use by visitors to the premises. In an instance in which a wirelessmesh network supports only one user network, all APs in the network havethe same SSID, but each AP in the network has a unique BSSID. Both aBSSID and an SSID are “unique identifiers” as that term is used herein.

As indicated by block 30, the exemplary AP 60 first determines whetherit is connected to controller 28 (or any other such controller) via awired communication link, i.e., determines whether it is a portal AP. Ifthe exemplary AP 60 determines that it is not connected via a wiredcommunication link, then the exemplary AP 60 begins the process ofselecting a BSSID. If the exemplary AP 60 is connected via a wiredcommunication link to a controller, then it does not need to select aBSSID using the method described herein, as the controller can provide aBSSID in a conventional manner similar to a non-mesh wireless network.

As indicated by block 32, the exemplary AP 60 scans or monitors wirelesscommunications or transmissions on all channels and across allregulatory domains. Such communications may include those transmitted byother APs 12-18 other than the exemplary AP 60; those transmitted byother APs (not shown) of wireless mesh networks other than wireless meshnetwork 10 and controlled by controllers other than controller 28; andthose transmitted by still other APs (not shown) of other tenants ofcontroller 28. In the exemplary embodiment, the beacon signaltransmitted by each of APs 12-18 (as well as any other APs that may bein proximity) includes the following items of information: informationuniquely identifying the controller 28 associated with the transmittingAP; information uniquely identifying the tenant associated with thetransmitting AP; the number of hops between the transmitting AP and anassociated wireless mesh portal AP; and the number of APs existing inthe transmitting AP's wireless mesh network at the time of thetransmission.

By scanning or monitoring for beacon signals transmitted by other APs,the exemplary AP 60 can collect the above-listed information items foreach detected beacon signal. The exemplary AP 60 also collects the SSIDand BSSID included in each detected beacon signal. The information itemscollected from all detected beacon signals form a candidate set. Thecandidate set thus includes the SSID of each detected beacon signal andthe other items of information associated with each BSSID.

As indicated by block 34, the exemplary AP 60 then selects a candidateBSSID from the candidate set. The exemplary AP 60 can prioritize theselection by determining a priority of each candidate BSSID in thecandidate set. For example, the exemplary AP 60 can maintain thecandidate set in the form of a list ordered by priority. A priority canbe computed in response to inputs such as radio signal strength, theabove-described number of hops the above-described number of APs in thewireless mesh network, etc. For example:

PRIORITY=2*RSSI−(H/10)*RSSI−(NU/1000)*RSSI,

where PRIORITY is a numerical value indicating priority, RSSI is ameasurement of the beacon (transmission) signal strength above a noisefloor, H is the number of hops, and NU is the number of APs in thewireless mesh network associated with the transmission.

Note that the candidate BSSID is associated with the AP transmissionfrom which the BSSID was collected. For purposes of clarity andconvenience, that AP also can be referred to herein as the candidate AP.The candidate AP, i.e., an AP operating in accordance with the candidateBSSID, may or may not be a peer of the exemplary AP 60 (operating inaccordance with its own BSSID). Note that the candidate AP and exemplaryAP 60 are peers in an instance in which the candidate AP and theexemplary AP 60 are: (a) controlled by the same controller as eachother; (b) are in the same domain as each other (i.e., both thecandidate AP and exemplary AP 60 are controlled by the same tenant aseach other); and (c) are operating in the same user network (i.e., SSID)as each other. It is possible, however, that in some instances thecandidate AP and exemplary AP 60 are, are controlled by differentcontrollers or tenants from each other, or are operating in differentuser networks from each other. A goal of the method is to select a BSSIDassociated with a candidate AP that is a peer of the exemplary AP 60.

As indicated by block 36, the exemplary AP 60 then establishes awireless communication link or uplink with a controller. The controllerwith which the exemplary AP 60 establishes a communication link may becontroller 28 of wireless mesh network 10 or some other controller (notshown for purposes of clarity). It should be understood that theexemplary AP 60 does not have the ability to select or identify thecontroller with which it establishes an uplink, as this depends upon theidentity of the candidate AP. The candidate AP forwards, via its peers,communications received from the exemplary AP to the controller thatcontrols the candidate AP. Note that in a multi-tenant environment theuplink is associated with one of the tenants of the controller. Itshould be understood that the exemplary AP 60 does not have the abilityto select or identify the tenant associated with the uplink, as this toodepends upon the identity of the candidate AP. Similarly, note that in amulti-SSID environment the uplink is associated with one of the SSIDs.The exemplary AP 60 does not have the ability to select or identify theSSID associated with the uplink, as this likewise depends upon theidentity of the candidate AP. The candidate AP forwards, via its peers,communications received from the exemplary AP to the tenant thatcontrols the candidate AP.

As indicated by block 38, the exemplary AP 60 transmits a request to thecontroller to join the wireless mesh network associated with thecandidate SSID. As indicated by block 40, the exemplary AP 60 receives aresponse from the controller indicating either that the controlleraccepted the request or that the controller rejected the request. In aninstance in which the response is a rejection, the response includesreason information indicating one or more reasons why the request wasrejected. As described below, the exemplary AP 60 uses the reasoninformation to remove or thin candidate BSSIDs from the candidate set.

As indicated by block 42, the exemplary AP 60 determines whether thereason information indicates that the exemplary AP 60 is not associatedwith a license or authorization permitting the controller to control theexemplary AP 60. (Note that the controller can identify the exemplary AP60 by its media access control (MAC) address.) If the exemplary AP 60determines (block 42) that the reason information indicates theexemplary AP 60 is not associated with such a license or authorization,then the exemplary AP 60 rejects not only the candidate BSSID but alsothins the candidate set by rejecting all other BSSIDs in the candidateset that are associated with that same controller, as indicated by block44.

However, if the exemplary AP 60 determines that the reason informationindicates the exemplary AP 60 is associated with such a license orauthorization, then the exemplary AP 60 determines whether the reasoninformation indicates the exemplary AP 60 is not associated with atenant associated with the controller, as indicated by block 46. Notethat the uplink or route through the wireless mesh network between theexemplary AP 60 and the controller may be associated with a certaintenant in a multi-tenant environment.

If the exemplary AP 60 determines (block 46) that the reason informationindicates the exemplary AP 60 is not associated with a tenant associatedwith the controller, then the exemplary AP 60 not only rejects thecandidate BSSID but also thins the candidate set by rejecting all otherBSSIDs in the candidate set that are associated with both thatcontroller and that tenant associated with that controller, as indicatedby block 50. Note that an instance in which the exemplary AP 60 is notassociated with a tenant associated with the controller indicates thatthe exemplary AP 60 has established an uplink with a proper controllerbut with an improper tenant of that controller. Therefore, the exemplaryAP 60 also rejects all other BSSIDs in the candidate set associated witha controller other than the controller with which the exemplary AP 60has established the communication link using the candidate BSSID, asindicated by block 52.

If the exemplary AP 60 determines (block 46) that the reason informationdoes not indicate the candidate BSSID is not associated with a tenantassociated with the controller, then the exemplary AP 60 determineswhether the reason information indicates the candidate BSSID is notassociated with an SSID associated with the controller, as indicated byblock 56. If the exemplary AP 60 determines that the reason informationindicates the candidate BSSID is not associated with the controller,then the exemplary AP 60 not only rejects the candidate BSSID but alsothins the candidate set by rejecting other BSSIDs in the candidate setthat are associated with the same SSID as the candidate BSSID, asindicated by block 57. In addition, as indicated by block 58, in such aninstance the exemplary AP also rejects other BSSIDs in the candidate setassociated either with a controller other than the controller with whichthe exemplary AP 60 has established the communication link using thecandidate BSSID or with a tenant other than the tenant with which theexemplary AP has established the communication link using the candidateBSSID.

However, if the exemplary AP 60 determines (block 56) that the reasoninformation does not indicate that the candidate BSSID is not associatedwith an SSID associated with the controller, then the exemplary AP 60has achieved the goal of identifying a BSSID with which it cancommunicate in an authorized and otherwise proper manner. In otherwords, the exemplary AP has established a communication linkcharacterized by: (a) a controller that deems the exemplary AP 60 tohave a license permitting the controller to control the exemplary AP 60;(b) a tenant associated with the exemplary AP 60; and (c) a user network(SSID) associated with the exemplary AP 60. Accordingly, as indicated byblock 48, the exemplary AP 60 saves this candidate BSSID as well asinformation identifying the controller and tenant, and configures itselfto use the saved BSSID in further communications. The method iseffectively completed.

Following blocks 44, 52 and 58, as indicated by block 54, the exemplaryAP 60 then determines whether all candidate BSSIDs in the candidate sethave been subjected to the selection testing described above with regardto block 36-52. If the exemplary AP 60 determines that all candidateBSSIDs in the candidate set have not yet been tested, i.e., there aremore BSSIDs in the candidate set, then the method continues as describedabove with regard to block 34, such that the next highest priority BSSIDin the candidate set is selected next. If the exemplary AP 60 determinesthat all candidate BSSIDs in the candidate set have been tested, i.e.,there are no more BSSIDs in the candidate set, then the method continuesas described above with regard to block 32. Even once a suitable BSSIDhas been identified, the exemplary AP 60 can continue to collect andmaintain the candidate set for use in the event that the exemplary AP 60is relocated or otherwise later needs to select another suitable BSSID.

It should be understood that the method described above is not intendedto represent the entirety of the operation of each of APs 12-18, network10 or any portion thereof. Rather, the method described above representsonly those operational aspects that are most directly related to theexemplary embodiment of the invention. Other operational aspects of eachof APs 12-18, such as those that are conventional, may not be describedherein, as they are well understood by persons skilled in the art.Except as otherwise stated herein, each of APs 12-18 operates not onlyin the manner described above but also in a conventional manner. Thus,for example, each of APs 12-18 is configured to establish andcommunicate via wireless communication links with client devices (notshown).

As illustrated in FIG. 3, the exemplary AP 60 can include a processor62, a radio interface 64, and a memory 66. In addition to theseelements, AP 60 can include any other suitable elements commonlyincluded in conventional wireless mesh access points. However, as theabove-referenced elements are most directly related to the operation ofthe exemplary embodiment of the invention, only these elements are shownand described herein for purposes of clarity. Conventional elements,including some conventional logic, of AP 60 are not shown or describedherein, as they are well understood by persons skilled in the art. Aswell understood in the art, radio interface 64, under control ofprocessor 62, is configured to establish the above-referenced wirelesscommunication links.

AP 60 includes the following logic elements: candidate set determinationlogic 68, prioritization logic 70, candidate set selection logic 72,uplink logic 74, request logic 76, response logic 78, and candidaterejection logic 80. Candidate rejection logic 80 includes thinning logic82. Although the foregoing logic elements are shown in FIG. 3 in aconceptual manner as stored in or residing in memory 66, persons skilledin the art understand that such logic elements arise through theoperation of processor 62 and may not be present simultaneously or intheir entireties in memory 66. Such software or firmware contributes toprogramming or configuring the processing system, comprising processor62 and memory 66, with such logic elements. Although memory 66 isdepicted as a single or unitary element, memory 66 can be of anysuitable type and can have any suitable structure, such as one or moremodules, chips, etc. Memory 66 can be, for example, a non-volatile typesuch as flash memory. Such software or firmware can be stored orotherwise embodied in any suitable non-transitory medium, including anysuitable type of memory, and operated upon in memory 66 or other datastorage medium in accordance with well-known computing principles. Suchsoftware or firmware can be loaded into memory 66 or other memory (notshown) in any suitable manner, such as during a configuration procedurepreceding the method of operation described above. The broken-linearrows in FIG. 3 conceptually represent some of the communication ofinformation that occurs among some of the logic elements of AP 60.

It should be understood that the combination of memory 66 and theabove-referenced logic elements or software, firmware, instructions,etc., underlying the logic elements, as stored in memory 66 innon-transitory computer-readable form, defines a “computer programproduct” as that term is understood in the patent lexicon. In view ofthe descriptions herein, persons skilled in the art will readily becapable of providing suitable software or firmware or otherwiseconfiguring AP 60 to operate in the manner described. Also, although theeffect of each of the above-referenced logic elements is describedherein, it should be understood that the effect may result fromcontributions of two or more logic elements, or from contributions ofthe logic elements and conventional wireless mesh access point logicelements or other network features that are not shown for purposes ofclarity.

Candidate set determination logic 68 contributes to the configuring ofAP 60 to determine a candidate set of BSSIDs by monitoring for detectionof a set of one or more wireless communications. Prioritization logic 70contributes to the configuring of AP 60 to assign a priority to eachBSSID in the candidate set. Candidate set selection logic 72 contributesto the configuring of AP 60 to select a candidate BSSID from thecandidate set. Uplink logic 74 contributes to the configuring of AP 60to establish an uplink with a controller of a wireless mesh networkassociated with the candidate unique identifier. Uplink logic 74 alsocontributes to the figuring of AP 60 to determine whether a wirednetwork connection exists and to establish an uplink via such a wiredconnection. Request logic 76 contributes to the configuring of AP 60 totransmit a request to the controller to join the wireless mesh networkassociated with the candidate BSSID. Response logic 78 contributes tothe configuring of AP 60 to receive a response from the controllerindicating either an acceptance or a rejection of the request. Candidaterejection logic 80 contributes to the configuring of AP 60 to reject oneor more BSSIDs in the candidate set based on the reason informationincluded in a rejection. Thinning logic 82 contributes to theconfiguring of AP 60 to use the reason information to intelligently thinthe candidate set in a manner that rejects as many unsuitable BSSIDs ascan be identified as early in the process as possible.

It should be understood that although for purposes of clarity theexemplary method, system and computer program product are describedabove with regard to an exemplary one of APs 12-18, the samedescriptions apply to each of APs 12-18. Thus, wireless network 10 canbe formed by placing and otherwise installing each of APs 12-18 in themanner described above.

One or more illustrative or exemplary embodiments of the invention havebeen described above. However, it is to be understood that the inventionis defined by the appended claims and is not limited to the specificembodiments described.

What is claimed is:
 1. A method for operation of a wireless mesh accesspoint, comprising: determining a candidate set of unique identifiers bymonitoring for detection of a set of one or more wirelesscommunications, each bearing a unique identifier; selecting a candidateunique identifier from the candidate set; establishing a wirelesscommunication link with a controller of a wireless mesh networkassociated with the candidate unique identifier; transmitting a requestto the controller to join the wireless mesh network associated with thecandidate unique identifier; receiving a response from the controllerindicating one of an acceptance of the request and a rejection of therequest, the rejection of the request including reason information; andrejecting one or more unique identifiers in the candidate set inresponse to the reason information included in a rejection of therequest.
 2. The method of claim 1, further comprising assigning apriority to each unique identifier in the candidate set, wherein theselecting step is performed in response to the priority assigned to eachunique identifier in the candidate set.
 3. The method of claim 1,further comprising: determining if a wired communication link exists;and transmitting the request via the wired communication link before thestep of transmitting the request to the controller to join the wirelessmesh network associated with the candidate unique identifier.
 4. Themethod of claim 1, wherein rejecting one or more unique identifiers inthe candidate set comprises: rejecting the candidate unique identifier;determining if the reason information indicates the wireless mesh accesspoint is not associated with a license to be operated by the controller;determining if the candidate set includes one or more additional uniqueidentifiers associated with the controller if the reason informationindicates the wireless mesh access point is not associated with alicense to be operated by the controller; and rejecting the one or moreadditional unique identifiers if the reason information indicates thewireless mesh access point is not associated with a license to beoperated by the controller.
 5. The method of claim 4, wherein the one ormore additional unique identifiers rejected if the reason informationindicates the wireless mesh access point is not associated with alicense to be operated by the controller consist of all uniqueidentifiers in the candidate set associated with the controller.
 6. Themethod of claim 1, wherein rejecting one or more unique identifiers inthe candidate set comprises: rejecting the candidate unique identifier;determining if the reason information indicates the wireless mesh accesspoint is not associated with a tenant associated with the controller;determining if the candidate set includes one or more additional uniqueidentifiers associated with the controller if the reason informationindicates the wireless mesh access point is not associated with a tenantassociated with the controller; and rejecting the one or more additionalunique identifiers if the reason information indicates the wireless meshaccess point is not associated with a tenant associated with thecontroller.
 7. The method of claim 6, wherein the one or more additionalunique identifiers rejected if the reason information indicates thewireless mesh access point is not associated with a tenant associatedwith the controller consist of all unique identifiers in the candidateset associated with both the controller and the tenant associated withthe wireless mesh access point.
 8. The method of claim 6, wherein theone or more additional unique identifiers rejected if the reasoninformation indicates the wireless mesh access point is not associatedwith a tenant associated with the controller consist of all uniqueidentifiers in the candidate set associated with another controller. 9.A wireless mesh access point, comprising: a radio interface configuredto provide wireless communication; and a processing system comprising aprocessor and memory, the processing system configured to include:candidate set determination logic configured to determine a candidateset of unique identifiers by monitoring for detection of a set of one ormore wireless communications, each bearing a unique identifier;candidate selection logic configured to select a candidate uniqueidentifier from the candidate set; uplink logic configured to establisha wireless communication link with a controller of a wireless meshnetwork associated with the candidate unique identifier; request logicconfigured to transmit a request to the controller to join the wirelessmesh network associated with the candidate unique identifier; responselogic configured to receive a response from the controller indicatingone of an acceptance of the request and a rejection of the request, therejection of the request including reason information; and candidaterejection logic configured to reject one or more unique identifiers inthe candidate set in response to the reason information included in arejection of the request.
 10. The wireless mesh access point of claim 9,wherein the processing system is further configured to includeprioritization logic configured to assign a priority to each uniqueidentifier in the candidate set, wherein the candidate selection logicoperates in response to the priority assigned to each unique identifierin the candidate set.
 11. The wireless mesh access point of claim 9,wherein the processing system is further configured to include wiredlink logic configured to determine if a wired communication link existsand to transmit the request via the wired communication link.
 12. Thewireless mesh access point of claim 9, wherein the candidate rejectionlogic is configured to reject the candidate unique identifier andfurther comprises candidate set thinning logic configured to determineif the reason information indicates the wireless mesh access point isnot associated with a license to be operated by the controller, todetermine if the candidate set includes one or more additional uniqueidentifiers associated with the controller if the reason informationindicates the wireless mesh access point is not associated with alicense to be operated by the controller, and to reject the one or moreadditional unique identifiers if the reason information indicates thewireless mesh access point is not associated with a license to beoperated by the controller.
 13. The wireless mesh access point of claim12, wherein the one or more additional unique identifiers rejected ifthe reason information indicates the wireless mesh access point is notassociated with a license to be operated by the controller consist ofall unique identifiers in the candidate set associated with thecontroller.
 14. The wireless mesh access point of claim 9, wherein thecandidate rejection logic is configured to reject the candidate uniqueidentifier and further comprises candidate set thinning logic configuredto determine if the reason information indicates the wireless meshaccess point is not associated with a tenant associated with thecontroller, to determine if the candidate set includes one or moreadditional unique identifiers associated with the controller if thereason information indicates the wireless mesh access point is notassociated with a tenant associate with the controller, and to rejectthe one or more additional unique identifiers if the reason informationindicates the wireless mesh access point is not associated with a tenantassociated with the controller.
 15. The wireless mesh access point ofclaim 14, wherein the one or more additional unique identifiers rejectedif the reason information indicates the wireless mesh access point isnot associated with a tenant associated with the controller consist ofall unique identifiers in the candidate set associated with both thecontroller and the tenant associated with the wireless mesh accesspoint.
 16. The wireless mesh access point of claim 14, wherein the oneor more additional unique identifiers rejected if the reason informationindicates the wireless mesh access point is not associated with a tenantassociated with the controller consist of all unique identifiers in thecandidate set associated with another controller.
 17. A computer programproduct for operating a wireless mesh access point, the computer programproduct comprising a computer-readable medium having stored thereon innon-transitory computer-readable form instructions that when executed bya processing system of the wireless mesh access point causes thewireless mesh access point to effectuate a method comprising:determining a candidate set of unique identifiers by monitoring fordetection of a set of one or more wireless communications, each bearinga unique identifier; selecting a candidate unique identifier from thecandidate set; establishing a wireless communication link with acontroller of a wireless mesh network associated with the candidateunique identifier; transmitting a request to the controller to join thewireless mesh network associated with the candidate unique identifier;receiving a response from the controller indicating one of an acceptanceof the request and a rejection of the request, the rejection of therequest including reason information; and rejecting one or more uniqueidentifiers in the candidate set in response to the reason informationincluded in a rejection of the request.
 18. The computer program productof claim 17, further comprising instructions that when executed by theprocessing system cause the wireless mesh access point to effectuate themethod further comprising assigning a priority to each unique identifierin the candidate set, wherein the selecting step is performed inresponse to the priority assigned to each unique identifier in thecandidate set.
 19. The computer program product of claim 17, whereinrejecting one or more unique identifiers in the candidate set comprises:rejecting the candidate unique identifier; determining if the reasoninformation indicates the wireless mesh access point is not associatedwith a license to be operated by the controller; determining if thecandidate set includes one or more additional unique identifiersassociated with the controller if the reason information indicates thewireless mesh access point is not associated with a license to beoperated by the controller; and rejecting the one or more additionalunique identifiers if the reason information indicates the wireless meshaccess point is not associated with a license to be operated by thecontroller.
 20. The computer program product of claim 17, whereinrejecting one or more unique identifiers in the candidate set comprises:rejecting the candidate unique identifier; determining if the reasoninformation indicates the wireless mesh access point is not associatedwith a tenant associated with the controller; determining if thecandidate set includes one or more additional unique identifiersassociated with the controller if the reason information indicates thewireless mesh access point is not associated with a tenant associatewith the controller; and rejecting the one or more additional uniqueidentifiers if the reason information indicates the wireless mesh accesspoint is not associated with a tenant associated with the controller.