* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Wireless MESH Networks
Policies promoting wireless broadband in the United States wikipedia , lookup
Wake-on-LAN wikipedia , lookup
IEEE 802.1aq wikipedia , lookup
Computer security wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Extensible Authentication Protocol wikipedia , lookup
Distributed firewall wikipedia , lookup
Computer network wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Network tap wikipedia , lookup
Peer-to-peer wikipedia , lookup
Airborne Networking wikipedia , lookup
Routing in delay-tolerant networking wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Wireless MESH Networks By: Tapu Ahmed Marshall Grillos Current Cellular Topology Basic Layout Problems with Current Design Single point of failure Solution When you have a single node failure in MESH topology, the other nodes can simply “go around” to get to their neighbors. Advantages to MESH Incredible amount of flexibility in session setup. All that is needed is a radio Radio acts as both transmitter and receiver MESH networks can be extremely advantageous to small business owners. Problems with MESH Distance is the primary disadvantage of MESH networks Coverage area becomes a problem as well Problems continued Routing Complexity You must dynamically locate your neighbors. Battery-Life Mobiles must remain “on” for a wireless MESH network to be useful. Why not MESH Now? Shannon’s Law (Spectrum Capacity) Amount of throughput that can be achieved depends on the level of interference. If interference goes up, throughput goes down. Mesh Protocols 802.11 Standard Most MESH operate on this standard since the 802.11 standard is by far the most widely deployed in wireless LAN. Thus it will contain: physical, MAC, and link layer. 802.11 Basic design Source Destination RTS Data CTS Questions to consider: •When to initiate a route request •When and how to buffer packets during route discovery •When to update the lifetime of an active route ACK AODV Ad-hoc On Demand Distance Vector AODV is a reactive routing protocol. Routes to other nodes are determined only when needed. Source Node1 Node2 Destination Hello Route Request Route Reply Data X Route Error AODV Advantages: Since the nodes can change in and out of the network quickly, you will not run into dead ends Uses little memory Good for small applications Disadvantages Inefficient when there is a large number of routes needed and for applications that cannot tolerate the delay of route discovery. TBRPF Topology Broadcast based on Reverse-Path Forwarding TBRPF is a proactive routing protocol. Each node is provided with the state of each link in the network. Broadcast trees are updated automatically Creates a link-state design that has minimal overhead. TBRPF Advantages: Improved efficiency Alternate paths immediately available. Helps the quality of service. Disadvantages Better suited for larger applications Extensions Redundancy The meaning of “redundancy” in general network architecture is a matter of degree and must be carefully specified. To reach higher levels of redundancy, you may add an additional line of fiber next to an existing one. In a mesh network, the degree of redundancy is essentially a function of node density. A network can be deliberately over-designed for reliability simply by adding extra nodes, so each device has two or more paths for sending data. It can additionally be achieved by increasing the number of simultaneous connections a node may have. Example, Simple vs. Complex Mesh A simple mesh network is one that requires relationships between the nodes or devices on the LAN. Devices need not all directly connected for a simple mesh Complex Mesh (Pure Mesh or Logical Mesh) In a complex mesh, all nodes must be connected to all other nodes. The number of relationships in a network can be represented by the formula N(N-1) where N is the number of devices in the network. A complex mesh is vastly more redundant than a simple mesh. This is often at the cost of higher network overhead. Mesh Networks Security Issues Another Mesh Example Dynamically configured and modified. What implications on security? Each node acts as a router and an end user. Security Implications Security in data transmission (much more than typical WLAN due to multiple hops over wireless). Actually sending packets over the air. Ensuring who’s receiving the packets is the intended target. Security of Network Access Ensuring everyone on the network should be on the network (user authentication). User Authentication and Partial Mesh Mesh exists outside of WLAN Relies on WLAN RADIUS servers for Authentication (much like WLINE networks today) What about pure Mesh authentication? Each node must have all authentication data or connectivity to an authentication agent. Generally multiple authentication agents must exist for redundancy and efficiency (number of hops). ASIC security can be implemented to have pure hardware authentication of a device. MeshDynamics suggests ASIC Security and “Smart Cards” ASIC - Application-Specific Integrated Circuit: a very large scale integrated circuit (a VLSI chip) designed for a specific customer and function (often on the basis of a Programmable Gate Array). Security chip devised for one way authentication. Used by Satellite TV Providers (DishNetworks, DirecTV). Used by American Express (American Express Blue). ASIC Continued Security chip contains application specific modifiable software for key decryption. Card must be ‘activated’ in authentication server to receive proper decryption keys. Cards are easily changeable/upgradeable by companies. Removes the need for ‘login’ procedure. Cards can be read by wireless units (PDA, Laptop, etc). Secure Data Transmission - WPA Wi-Fi Protected Access WPA is the Wi-Fi Alliance’s new security standard that supersedes WEP (wired equivalent privacy). WPA is based on an early version of the IEEE 802.11i standard. WPA upgrades WEP encryption with a stronger cipher, Temporal Key Integrity Protocol (TKIP) – timed keys, that fixes known vulnerabilities in the WEP encryption algorithm. WPA also introduces stronger authentication using RADIUS as well as port-based access control based on IEEE 802.1x. WPA contributes to network access control and secure data transmission. Modern Day Applications of Mesh MeshDynamics Offers Three-Radio Mesh Network Solution From neighborhoods up to citywide coverage Services Include: Mobile Data, VoIP, and Public Safety Networks U.S. Military The Pentagon, about a decade ago, set out to design a wireless communications network that could survive a war. One design that has emerged, in portable military communications gear that has been used in Afghanistan and could be used in the Iraqi theater, is called "mobile ad-hoc" or mesh networking. This provides instant up to date troop and unit movements (all units are connected to the wireless mesh network). Surveillance and tracking opposition Industry Mesh based diagnostic networks Efficiency and stability monitoring Real Time Diagnostics Industry Diagnostics Mesh Networks can provide a low-cost diagnostic channel outside of normal control loops. This enables significant productivity improvements where manual measurements may have previously been required. By regularly capturing diagnostic data, plants can use predictive maintenance for cost savings. Questions Q1: What problems do centralized designs present and how does a MESH network go about addressing those problems? Q2: Would you use a proactive or reactive protocol in a large MESH environment. Why? Q3: How do you increase redundancy in a Mesh network? Answers Answer1: MESH networks avoid a single point of failure which can be detrimental to centralized systems. MESH topology eliminates routers, controllers, etc. Answer2: You should use a proactive (TBRPF) protocol since large applications cannot tolerate the delay of route discovery. Answer3: In a mesh network, the degree of redundancy is essentially a function of node density. You can increase the number of nodes (to increase the density). Additionally, it can be achieved by increasing the number of simultaneous connections a node may have. References http://dailywireless.org/modules.php?name=Ne ws&file=article&sid=2010 http://www.iapplianceweb.com/story/oeg20040 117s0019.htm http://home.pacific.net.au/~djames.hub/mesh/ routing_faq.html http://www.oreillynet.com/pub/a/wireless/200 4/01/22/wirelessmesh.html References Cont. http://www.meshdynamics.com/ http://wi-fi.org/ http://www.sensorsmag.com/articles/0203/38/ main.shtml