Free Essay

Mesh Network

In:

Submitted By pratu
Words 1896
Pages 8
A wireless mesh network is any wireless network where data is transmitted using mesh networking. That is, where nodes don't just send and receive data, but also serve as a relay for other nodes and each node collaborates in propagating data on the network.

A wireless mesh network can be thought of as a collection of nodes where each mesh node is also a router. Compare this to a WiFi access point where service can be provided only within reach of the signal and when it is turned off, the connection is gone. Mesh nodes work differently by rerouting data to another hop which it is connected to, bypassing the empty area where a node might be off.

Techopedia explains Wireless Mesh Network (WMN)

The concept of mesh networking can be applied to both physical and wireless networking, but it's much more commmon for wireless networks given the cabling costs that would be required to implement as a physical topology.

A key difference here is that mesh nodes work in a cooperative gain scheme where the more nodes that are active, the greater the bandwidth available Consider this analogy in traditional networking: when cars (data) coming from a wide road comes to a small bridge they all have to slow down to wait in line. To increase the number of cars going through, you need to make a bigger bridge (add bandwidth) which is then wasted in times of less traffic. In mesh networking, imagine people coming to a river, where in order to continue each person drops a rock to make a foot bridge. The more people that needs to pass, the more rocks are thrown in. But if there are fewer users, then only a few rocks are needed. In other words, the bandwidth scales automatically based on the number of users

Definition - What does Mesh Networking mean?

Mesh networking is a type of network topology in which a device (node) transmits its own data as well as serves as a relay for other nodes. Routers are used to provide the best and most efficient data path for effective communication. In the event of a hardware failure, many routes are available to continue the network communication process.
Techopedia explains Mesh Networking

There are two types of mesh networking topologies:

Total Mesh Topology: This kind of topology is in effect when every node in the network is connected to all the other nodes with direct links. This provides greater redundancy, because if any node fails, the network traffic can be directed using other nodes. Each node accesses the working nodes in close proximity and finds the best route for efficient and reliable communication. Partial Mesh Topology: This kind of topology is in effect when some nodes are connected with all the other nodes using direct links, while some are just connected to one or two nodes only. This is less expensive to implement compared to total mesh topology, but has less redundancy.

A mesh networking layout is not commonly used because of high costs related to cabling, devices and its complex infrastructure. However, wireless mesh networks are very popular among wireless networks and their users. This is because, by definition, a wireless network does not need cabling or any other physical infrastructure other than an access point.

Definition - What does Node mean?

A node is a point of intersection/connection within a network. In an environment where all devices are accessible through the network, these devices are all considered nodes. The concept of nodes works on several levels, but the big-picture view defines nodes as the major centers through which Internet traffic is typically routed. This usage is somewhat confusing, as these same Internet nodes are also referred to as Internet hubs.
Techopedia explains Node

The idea of nodes was popularized with the adoption of packet-switching theory and the concept of distributed networks. In this context, nodes were gateways that could receive, store and send information along different routes through a distributed network. Each node was given an equal standing within the network, meaning that the loss of any one node wouldn’t significantly hurt the network.

When applied to an office or personal network, however, a node is simply one of the devices that performs a particular function. As such, the loss of that node usually means the loss of function, such as the inability to use a printer.

What does Router mean?

A router is a device that analyzes the contents of data packets transmitted within a network or to another network. Routers determine whether the source and destination are on the same network or whether data must be transferred from one network type to another, which requires encapsulating the data packet with routing protocol header information for the new network type

OSI MODEL

These jobs are split into seven layers, each of which depends on the function’s “handed-off” from other layers. As a result, the OSI model also provides a guide for troubleshooting network problems by tracking them down to a specific layer. Here we’ll take a look at the layers of the OSI model and what functions they perform within a network.

1. Physical Layer
The physical layer is the actual cable, fibers, cards, switches, and other mechanical and electrical equipment that make up a network. This is the layer that transforms digital data into signals that can be sent down a wire to transmit data. These signals are often electrical but, as in the case of fiber optics, they can also be non-electrical signals such as optics or any other type of pulse that can be digitally encoded. From a networking perspective, the purpose of the physical layer is to provide the architecture for data to be sent and received. The physical layer is probably the easiest layer to troubleshoot but the most difficult to repair or construct, as this involves getting the hardware infrastructure hooked up and plugged in.
2. Data Link Layer
The data link layer is where information is converted into coherent “packets” and frames that are passed to higher layers. Essentially, the data link layer unpacks raw data coming in from the physical layer and translates information from the upper layers into raw data to be sent over the physical layer. The data link layer is also responsible for catching and compensating for any errors that occur in the physical layer.
3. Network Layer
The network layer is where the destination for incoming and outgoing data is set. If the data link layer is the highway for cars to drive on, the network layer is the GPS system telling drivers how to get there. Addressing is added to the data by tacking on information around the data packet in the form of an address header. This layer is also responsible for determining the quickest route to the destination and the handling of any problems with packet switching or network congestion. This is the layer where routers work to ensure that data is properly re-addressed before passing it on to the next leg of the packet’s journey.
4. Transport Layer
The transport layer is responsible for streaming data across the network. At this level, the data is not thought of in terms of individual packets but more in terms of a conversation. To accomplish this, protocols – which are defined as “rules of communication - are used. The protocols watch the complete transmission of many packets - checking the conversation for errors, acknowledging successful transmissions and requesting retransmission if errors are detected.

The network layer and the transport layer work together like a postal system. The network layer addresses the data, much like a person addresses an envelope. Then, the transport layer acts as the sender’s local postal branch, sorting and grouping all similarly addressed data into larger shipments bound for other local branches, where they will then be delivered.
5. Session Layer
The session layer is where connections are made, maintained and ended. This usually refers to application requests for data over the network.

Whereas the transport layer handles the actual flow of data, the session layer acts as an announcer, making sure that the programs and applications requesting and sending data know their requests are being filled. In technical terms, the session layer synchronizes data transmission.
6. Presentation Layer
The presentation layer is where received data is converted into a format that the application it is destined for can understand. The work done at this layer is best understood as a translation job. For example, data is often encrypted at the presentation layer before being passed to the other layers for sending. When data is received, it will be decrypted and passed on to the application it is intended for in the format that is expected.
7. Application Layer
The application layer coordinates network access for the software running on a particular computer or device. The protocols at the application layer handle the requests that different software applications are making to the network. If a Web browser wants to download an image, an email client wants to check the server and a file-sharing program wants to upload a movie, the protocols in the application layer will organize and execute these requests.
Putting It All Together
We’ve looked at the OSI model from the bottom layer up. A simplified summary of this process can be broken into three requirements:

The computer has to be hooked up to a network (physical layer), and must have a way to read data (data link layer). The network must also have a proper address (network layer) to know how to come and go. The network itself has to have ways of efficiently delivering data to the proper recipients (transport layer) and letting those recipients know it has been delivered (session layer). The data has to be unpacked and delivered to the application in a format it understands (presentation layer) and then must fill the requests various software applications make to the network for the user (application layer).

Sending data works in the opposite direction, starting at the top OSI layer – the application layer - and moving down through the model, finally ending when the data is received by the recipient via the physical layer.
Conclus ion: Lessons From the OSI Model

access point

In a wireless local area network (WLAN), an access point is a station that transmits and receives data (sometimes referred to as a transceiver). An access point connects users to other users within the network and also can serve as the point of interconnection between the WLAN and a fixed wire network. Each access point can serve multiple users within a defined network area; as people move beyond the range of one access point, they are automatically handed over to the next one. A small WLAN may only require a single access point; the number required increases as a function of the number of network users and the physical size of the network.

GATEWAY
A gateway is a network point that acts as an entrance to another network. On the Internet, a node or stopping point can be either a gateway node or a host (end-point) node. Both the computers of Internet users and the computers that serve pages to users are host nodes. The computers that control traffic within your company's network or at your local Internet service provider (ISP) are gateway nodes.

Similar Documents

Premium Essay

Wireless Mesh Network

...WIRE LESS MESS NETWORK WITH HRPU ABSTRACT A Wireless mesh network is a mesh network created through the connection of wireless access points installed at each network user’s locale. Each user is also a provider, forwarding data at next node. The networking infrastructure is decentralized and simplified because each node need only transmit as far as the next node. Wireless mesh networking could allow people living in the remote areas and small businesses operating in rural neighborhoods to connect their networks together for affordable Internet connections. Here we discuss a hybrid routing algorithm for wireless mesh networks. In HRPU, the mesh portal periodically broadcasts a mesh update message, which allows all nodes to have a route towards the mesh portal stored semi permanently in their routing table. Whenever a node has data to be sent to backbone network, it sends the data without any route establishment delay using the route to the mesh portal. In HRPU the mesh portals and mesh points are intelligent which further improves the performance. INTRODUCTION The Beginning: Wireless Mesh Networking (WMN) was developed as a quick way to set-up wireless networks during military operations. Since then it has grown considerably in popularity based on its advantages in both metropolitan and rural applications. WMNs are being applied as Hot Zones, which cover a broad area, such as a downtown city district. By 2010, municipal Wi-Fi networks will cover over 325...

Words: 4177 - Pages: 17

Free Essay

Implementation and Evaluation of Wireless Mesh Networks on Manet Routing Protocols

...Implementation and Evaluation of Wireless Mesh Networks on MANET Routing Protocols Shashi Bhushan1,Anil Saroliya2 ,Vijander Singh3 Research Scholar, Computer Science, Amity University, Jaipur, India 1 Assistant Professor, Computer Science, Amity University, Jaipur, India 2 Senior Lecturer, Computer Science, Amity University, Jaipur, India 3 Abstract—Wireless Mesh Network (WMN) is a kind of network which is made up of Mesh router and Mesh clients where Mesh router having lesser mobility and form the heart of WMNs. In this paper, Wireless Mesh Network over MANET implemented using routing protocols such as AODV, DSR. In this work NS-2.34 simulator is used for simulations. Various measurements and calculations were figure out in this work like throughput, Average end-end delay, PDR, NRL and Routing packets in Random way point mobility model. WMN have features such as self configuration, self healing and low cost of equipment. This work specifically aims to study the performance of routing protocols in a wireless mesh network, where static mesh routers and mobile clients participate together to implement networks functionality such as routing and packet forwarding in different mobility scenarios Keywords- Ad hoc Network, Routing Protocols, Wireless Mesh Network, Performance, Throughput, PDR, NRL and Routing packets in Random way point mobility model, Simulation on Network simulator NS-2, AODV,DSR , Routing Overhead. I. INTRODUCTION A Mobile Ad-hoc network (MANET) is an autonomous system...

Words: 4335 - Pages: 18

Free Essay

Calculus

...Chapter 3, Problem 1. Determine Ix in the circuit shown in Fig. 3.50 using nodal analysis. 1 kΩ Ix 9V + _ 2 kΩ + _ 6V 4 kΩ Figure 3.50 For Prob. 3.1. Chapter 3, Solution 1 Let Vx be the voltage at the node between 1-kΩ and 4-kΩ resistors. 9 − Vx 6 − Vx Vk + = 1k 4k 2k Vx Ix = = 3 mA 2k ⎯⎯ Vx = 6 → PROPRIETARY MATERIAL. © 2007 The McGraw-Hill Companies, Inc. All rights reserved. No part of this Manual may be displayed, reproduced or distributed in any form or by any means, without the prior written permission of the publisher, or used beyond the limited distribution to teachers and educators permitted by McGraw-Hill for their individual course preparation. If you are a student using this Manual, you are using it without permission. Chapter 3, Problem 2. For the circuit in Fig. 3.51, obtain v1 and v2. Figure 3.51 Chapter 3, Solution 2 At node 1, − v1 v1 v − v2 − = 6+ 1 10 5 2 At node 2, 60 = - 8v1 + 5v2 (1) v2 v − v2 = 3+ 6+ 1 4 2 Solving (1) and (2), v1 = 0 V, v2 = 12 V 36 = - 2v1 + 3v2 (2) PROPRIETARY MATERIAL. © 2007 The McGraw-Hill Companies, Inc. All rights reserved. No part of this Manual may be displayed, reproduced or distributed in any form or by any means, without the prior written permission of the publisher, or used beyond the limited distribution to teachers and educators permitted by McGraw-Hill for their individual course preparation. If you are a student using this Manual, you are using it without permission. Chapter...

Words: 19454 - Pages: 78

Free Essay

Nodal and Mesh Analysis

...Node Voltage Analysis (NVA) applicable to linear networks NVA gives you a process for obtaining n equations in n unknowns. The unknowns are the node voltages. Once you have the node voltages, you can find any voltage or current anywhere in the circuit. Process: (Note the key words to remember each step.) 1. Draw Draw the circuit diagram indicating all element and source values. 2. Label Label a reference node, usually ground or a node with the most branches. Then label a node voltage for all the other nodes in the circuit. You must recall the definition of a node voltage: It is the voltage of the node with respect to the reference node. It is not the same thing as the voltage across a branch. In general, the voltage across a branch between nodes 1 and 2will be the difference of the two node voltages on either side: v12 = v1 – v2 3. Dependant Write the controlling quantity of any dependant source in terms of node voltages. You will need to look for the controlling quantity in the circuit to do this. 4. Super Identify all the supernodes. Then write the voltage of the source inside the supernode in terms of the node voltages on either side. You must recall the definition of a supernode: It is any voltage source with the two nodes on either side of it considered as one big node. Note: Any equations that you get in this step will be part of the n equations. 5. Kirchoff Apply...

Words: 554 - Pages: 3

Free Essay

Anonymous Users Srs

...Software Requirements Specification For Anonymous User Communication For Privacy Protection in Wireless Metropolitan Mesh Networks Prepared by Under the Guidance of Table of Contents Revision History 1. Introduction 1.1 Purpose 1.2 Project Scope 1.3 References 2. Overall Description 2.1 Product Perspective 2.2 Product Features 2.3 User Classes and Characteristics 2.4 Operating Environment 2.5 Design and Implementation Constraints 3. System Features 3.1 System Feature 1 3.2 System Feature 2 (and so on) 4. External Interface Requirements 4.1 User Interfaces 4.2 Hardware Interfaces 4.3 Software Interfaces 4.4 Communications Interfaces 5. Other Nonfunctional Requirements 5.1 Performance Requirements 5.2 Safety Requirements 5.3 Security Requirements 5.4 Software Quality Attributes 6. Other Requirements Appendix A: Glossary Appendix B: Analysis Models 1. Introduction 1. Purpose The project is to make available security and privacy protection to the user credentials in wireless mesh networks (WMN) using group signature and pair wise secrets terms. 2. Project Scope In wireless mesh network, there is no restriction for public to access the internet or mobile services. So that the large numbers of attacks are might be happened like eavesdrop, inject or impersonate in WMN.All these attacks are great...

Words: 1918 - Pages: 8

Free Essay

Internet of Things

...Cisco, GE, IBM, Capgemini are already into consulting for IoT Skill Set Required • Aviation Industry • Independent Living • Medicine and Healthcare industry • Environment monitoring • Construction • Transportation Industry • MQTT: a protocol for collecting device data and communicating it to servers (D2S) • XMPP: a protocol best for connecting devices to people • DDS: a fast bus for integrating intelligent machines (D2D) • AMQP: a queuing system designed to connect servers to each other (S2S) • Wireless SoC(System on Chip) – built-in security features • Smart Dust to Interplanetary Internet • Riot OS -programming in C or C++ and can run both 16 and 32-bit platforms • Thingsquare Mist resilient wireless mesh networking Nest (Google) Philips Quirky Jawbone Withings Cisco • first non-annoying smoke detector • Hue lighting system • Spotter disc • Egg Minder • Nimbus dashboard • supercharged wristband • The Pulse • The Aura • security products, solutions Smart homes Productive and enhanced quality of life Inventory...

Words: 306 - Pages: 2

Free Essay

Tm586 Project Paper

...Introduction (100-User Wireless LAN-Design & Implementation Analysis) In this document, I will endeavor to provide a written analysis concerning the design and implementation of a wireless LAN (WLAN) for a firm comprised of one hundred employees. In illustration of the WLAN design, I will make reference to several sources regarding any related content that I’ve found to be pertinent and of practical benefit to this document’s purposes, not least of which is “ Top-Down Network Design ”, by Priscilla Oppenheimer, an instructional text detailing a method of network design that’s based upon what can be readily found evident throughout the overall networking community to be the most logical and efficient sequence of steps necessary in the creation of a network. Having stated this, it is of value for the reader to know that the aforementioned sequence of steps, as examined in Oppenheimer’s work, will correspond closely to the order of WLAN design and management issues that are addressed in this document, and can be followed up by way of documentation found under the same title and author at the end of this article. The major design and management issues found unique to a WLAN involve those pertaining specifically to the transmission and reception of radio frequency (RF) waves. For example, there is the strategic placement of access points (AP), which are devices designed to send and receive radio signals between nodes. This, in turn leads to a consideration of any possibility...

Words: 2801 - Pages: 12

Premium Essay

Cmgt 554/It Infrastructure Week 3

...a whole new network structure for the purpose of being more optimal and maintaining standards that keep up with advances in new technology. In most cases, a hospital’s network can transition over time with new technology and evolve into meeting the demands it requires to perform effectively. However, upgrading a hospital’s entire network can often be very expensive to implement and sustain. There may be a case where components or parts are no longer being produced to meet current and future demands. In the last several years, changes in healthcare put a demand on hospitals to maintain their networks with new, more efficient solutions that can enhance performance, keep cost low, but most one that is reliable . The Network architecture at Patton-Fuller hospital was designed for each department to rely on information flow between each department. In other words, if the accounting department needed information from the pharmacy or admissions in order to create invoices or insurance billing, it would be rely on those departments to share real time information through the network. It is important for a facility as large as a hospital to have a Networking system that information management (IM) can efficiently support the information flow. The Network architecture must have a design that is capable of supporting large amounts of data being transmitted through the Network server because it is the largest consumer of an information system (IS). By having a Network that is “efficient”...

Words: 1533 - Pages: 7

Free Essay

Zigbee Technology

...ZIGBEE TECHNOLOGY Raghda Al-dwaimeh . University of Jordan. Abstract—this document describes the concept of ZigBee. It is wireless network standard. Possible network topologies and device types are shown. Finally, the application of ZigBee devices in everyday life was proposed. 802.15.4 standard for wireless networks and full mesh networking support, 128bit AES security. III. HISTORY ZigBee-style networks began to be vision around 1999, when many installers recognized that both Wi-Fi and Bluetooth were going to be unsuitable for many applications.  ZigBee 2004: The IEEE 802.15.4-2003 standard was completed in May 2003.  ZigBee 2006: In September 2006, the ZigBee 2006 specification was announced. The 2004 stack is now, more or less ignored  ZigBee PRO: In 2007, ZigBee PRO, the enhanced ZigBee Pro Specification, was posted on 30 October 2007, and was finalized that same year. I. INTRODUCTION ZigBee is a low-cost, low-power, wireless mesh networking standard. The low cost allows the technology to be widely deployed in wireless control and monitoring applications, the low power-usage allows longer life with smaller batteries, ZigBee devices can transmit data over long distances by passing data through intermediate devices to reach more distant ones, and the mesh networking provides high reliability and larger range. The ZigBee Alliance, the standards body which defines ZigBee, also publishes application profiles that allow multiple OEM vendors to create interoperable...

Words: 921 - Pages: 4

Free Essay

Validation

...[pic] ZigBee Wireless Mesh Networking for Monitoring & Control What is ZigBee? ZigBee is a consortium of software, hardware and services companies that have developed a common standard for wireless networking of sensors and controllers. While other wireless standards are concerned with exchanging large amounts of data, ZigBee is for devices that have smaller throughput needs. The other driving factors are low cost, high reliability, high security, low battery usage, simplicity and interoperability with other ZigBee devices. ZigBee can be used in commercial applications such as building maintenance for monitoring and controlling lights, Heating, Ventilation and Air Conditioning (HVAC), smoke alarms, fire alarms, burglar alarms, landscaping sprinklers and lights and many other uses. In health care, ZigBee can be used for patient monitoring equipment, fitness monitoring and other uses. Industrial environments can use ZigBee for asset monitoring, process control, assuring compliance with environmental standards and energy management. Used correctly, ZigBee enabled devices can give a warning before a breakdown occurs so that repairs can be made in the most cost effective manner. They can also be used to maintain quality and reduce waste. Soon, ZigBee enabled devices will show up in our homes. They will be used for controlling our home entertainment systems, lights, garage door openers, alarms, panic buttons, and many other uses. Imagine your...

Words: 996 - Pages: 4

Free Essay

Abcdef

...Circuit Analysis using the Node and Mesh Methods We have seen that using Kirchhoff’s laws and Ohm’s law we can analyze any circuit to determine the operating conditions (the currents and voltages). The challenge of formal circuit analysis is to derive the smallest set of simultaneous equations that completely define the operating characteristics of a circuit. In this lecture we will develop two very powerful methods for analyzing any circuit: The node method and the mesh method. These methods are based on the systematic application of Kirchhoff’s laws. We will explain the steps required to obtain the solution by considering the circuit example shown on Figure 1. R1 + Vs R3 R2 R4 _ Figure 1. A typical resistive circuit. The Node Method. A voltage is always defined as the potential difference between two points. When we talk about the voltage at a certain point of a circuit we imply that the measurement is performed between that point and some other point in the circuit. In most cases that other point is referred to as ground. The node method or the node voltage method, is a very powerful approach for circuit analysis and it is based on the application of KCL, KVL and Ohm’s law. The procedure for analyzing a circuit with the node method is based on the following steps. 1. Clearly label all circuit parameters and distinguish the unknown parameters from the known. 2. Identify all nodes of the circuit. 3. Select a node as the reference node also called the ground and...

Words: 3646 - Pages: 15

Free Essay

On Implementation of Elliptic Curve Cryptography and Self-Certified Public Key Cryptosystems in Wireless Mesh Networks

...On Implementation of Elliptic Curve Cryptography and Self-Certified Public Key Cryptosystems in Wireless Mesh Networks A B.Tech Project Report submitted in fulfilment of the requirements for the Degree of Bachelor of Technology Submitted by K Bharadwaj Sharma 07010219 M Krishna Chaitanya 07010228 Under the Guidance of Dr.Ratnajit Bhattacharjee Department of Electronics and Electrical Engineering Indian Institute of Technology Guwahati Guwahati-781039, Assam i Candidate’s Declaration I hereby declare that the work which is being reported in this thesis entitled “ On Implementation of Elliptic Curve Cryptography and self-certified public key cryptosystems in Wireless Mesh Networks “ in partial fulfilment of the requirements for the award of the Degree of Bachelor of Technology, submitted in the Department of Electronics and Communication Engineering, Indian Institute of Technology Guwahati, is a record of my own work carried out during my thesis work under the supervision of Dr.Ratnajit Bhattacharjee, Associate Professor, Department of EEE, IIT Guwahati. The matter entitled in this thesis has not been submitted elsewhere for the award of any other degree. Place: Guwahati Date: 21st April, 2011 This is to certify that the above statement made by the candidate is correct to the best of my knowledge. April,2011 IIT Guwahati ` Supervisor: Dr. Ratnajit Bhattacharjee Associate Professor Dept. of EEE IIT Guwahati ii ACKNOWLEDGEMENT First and foremost...

Words: 7761 - Pages: 32

Premium Essay

Computing Trends - Networking Proposal for Rubha Reidh

...Networking Proposal for Rubha Reidh Name Institution Table of Contents Abstract 3 Introduction 5 Overview of Satellite Link Technology 7 Overview of Fibre Optics Link Technology 9 Choice of Satellite over Fibre Internet Connection 10 Wireless Networking Design 12 Mesh Network Backbone 13 802.11 Access Points 15 Intranet Services 16 Challenges 16 Proposed System Design 17 Phase I: Bed and breakfast building to include the private rooms, common area and lounge 17 Phase II: Extending to cover the lighthouse and associated surrounding area 18 Budget 18 Phase I Deployment 18 Phase II Deployment 19 References 21 Abstract The aim of the Rubha Reidh internet project is to construct a robust computer network to encompass the whole lighthouse area using a high speed and reliable internet connection. This has been determined as mesh networking technology. This network will deliver access to email, Web pages, and internet resources for users in the lighthouse area, using both laptops and desktops, as well as mobile devices with connectivity capability. By leveraging the usage of robust and inexpensive wireless network technology, this plan will substantially decrease expenditures for ensuring internet connectivity for the whole lighthouse area, as well as allow better elasticity in planning and expansion. Rubha Reidh is an automated lighthouse that is located in the Scottish remote western coast. Its remoteness stems from the fact that its nearest neighbour is Melvaig...

Words: 4859 - Pages: 20

Premium Essay

Wireless Network for Rural

...Architecture for Rural Network Connectivity 1 Introduction Many rural regions around the world, especially in developing regions, do not have good connectivity solutions which are economically viable. As a result, many of these regions remain disconnected from both the rest of the world and from progress in general. In this proposal, I will describe the design of WiFi-based Rural Extensions (WiRE), a new wireless network architecture that can provide connectivity to rural regions at extremely low costs. The WiRE architecture is tailored for the typical rural landscape in several developing regions, in which the population is spread across small but scattered rural regions (less than 1-2 sq kms) within 100-200 kms of the city. WiRE is designed to be a wireless distribution network that extends connectivity from the city to each village. The WiRE architecture has largely been inspired by my prior work on WiFi-based Long Distance (WiLD) Networks [42, 62, 35, 54, 64, 34], a low cost point-to-point network connectivity solution that provides very high bandwidth (typically 6− 10 Mbps) over very long-distances. While prior work on WiLD networks [48, 5, 42, 62, 35] has made significant progress in the design of highperformance MAC layer solutions, we still lack a vision of how to design a comprehensive, low-cost, rural connectivity architecture that can efficiently support a wide-range of applications. It is this goal that I wish to achieve in the WiRE network architecture design...

Words: 10544 - Pages: 43

Premium Essay

Nt1330 Unit 1 Assignment

...assignment based on World Reading Solutions (WLS) Company. It is a non-for-profit organization. Worldwide Reading Solutions has a small head office that is located in Manchester England. They want establish a best network in their head office. So for the build good network I will complete the entire 5 task.   Task-1 Networking Infrastructure and Protocols A) How network components should be connected, topology, type of cable and data rate Computer network components include the main parts that are required to install a network both at the office and home level. Before delving the installation process, we should be familiar with each part so that we could choose the right component that fits with our network system. There are three primary...

Words: 731 - Pages: 3