350 rub
Journal Achievements of Modern Radioelectronics №12 for 2010 г.
Article in number:
WiFi mesh Technology Review. Secure WiFi Self-Configuring Networks
Authors:
V. S. Eremin, P. V. Prokhorov
Abstract:
Mesh network - a number of nodes, connected in a computer network by wireless communication channels. Mesh network has the following features: - Shared data transfer medium; - Initially it is a peer-to-peer network; - Network is self-configurating; - Each node is a router; - Network topology may change in time; - New nodes can connect to existing network. Any node has at least one wireless network interface. In addition a node can have a wired or wireless interface, or additional radio interfaces at different frequency ranges. The advantages of self-configuring networks are: - Either increasing network coverage without increasing the power of radio equipment or reduction of power of radio equipment, while maintaining the initial coverage; - Reducing the cost of network management (frequency resource planning, address space, setting up ways to enter the global or corporate network, etc.). Nevertheless Mesh network technology has imperfections due to its features. Failover network requires active connection in case of one or more nodes' failure . So each network node has to analyze the quality of the communication channel according to a dynamic routing table, which shows changes in network topology. The route search is not an easy matter. To solve this problem the shortest path algorithms are applied. The route is chosen between variations of minimum cost criterion. The calculation takes into account the bandwidth of each relay station and the entire route from beginning to end. Also, the time of packet delivery, which is one of the main parameters of communication networks for real-time traffic (voice and video communications), is taken into account. The required transmitter power increases exponentially with increasing distance from the receiver. Application of Mesh technology allows reducing the required power of transmitting devices. Thus, the introduction of additional retransmitting nodes reduces the required output power of transmitter. This is significant advantage in terms of communication devices licensing and certification. Any system has vulnerabilities and Mesh technology is not an exception from this rule. Mesh nodes can not be considered safe in general. Data can be substituted by transmitting nodes because retransmitting node has full access to this data. Sending confidential data in clear text is unacceptable. Each node participating in routing must provide a specific set of services such as forwarding, service data routing, connected and disconnected nodes watch, traffic shaping in accordance with the established quality of service. Also node must not block all network bandwidth by its sole traffic. The result of violations of these prohibitions is network overload, denial of service that is fully reflected in the quality of the connection. The way of resistance to such abuses is to block nodes, which violate these rules. An effective way to impact on such a node is to exclude it from the routing. In this situation the node will be removed from the network and further interaction with him will be impossible. This method of protection is active against the attacker node on the link layer, but does not allow resisting to nodes, which create conflicts in the communication channel. Mesh networking technology has a high potential for creating new networks with a high level of reliability, quality and network bandwidth.
Pages: 37-44
References
  1. Clausen, T. (ed.) and Jacquet, P. (ed.), Optimized Link State Routing Protocol (OLSR), RFC3626 // Internet Engineering Task Force (IETF). Oct. 2003.
  2. IEEE. 802.11s Terms and Definitions, doc: IEEE 802.11-08/0895r0. July 2008.
  3. Tonnesen, A., Impementing and Extending the Optimized Link State Routing Protocol. http://www.olsr.org/
  4. Das.,S. R., Wireless Mesh Networking. http://www.cs.sunysb.edu/
  5. Perkins, C. E., Belding-Royer, E. M., Das, S., Ad Hoc on Demand Distance Vector (AODV) Routing // RFC 3561, Internet Engineering Task Force (IETF). July 2003.
  6. Camp, J. D., and Knightly, E. W., The IEEE 802.11s Extended Service Set Mesh Networking Standard // Electrical and Computer Engineering, Rice University.
  7. Cisco Secure Wireless Design Guide 1.0. July 11, 2007. http://www.cisco.com/application/pdf/ Вишневский В.,Гузаков Н., Лаконцев Д. Mesh сети стандарта IEEE 802.11s: протоколы маршрутизации // Первая миля. 2009. № 1. С. 16-21.