You are on page 1of 27

CHAPTER 1 INTRODUCTION

1.1 Introduction
Mesh Network is a network where all the nodes are connected to each other and is a complete network. In a Mesh Network every node is connected to other nodes on the network through hops. Some are connected through single hops and some may be connected with more than one hope. While the data is traveling on the Mesh Network it is automatically configured to reach the destination by taking the shortest route which means the least number of hops. Data travels by hopping from one node to another and then reaches the destination node in a Mesh Topology Network. An example of a Mesh Network is the Mobile Adhoc Network or MANet. The entire Mesh Network is continuously connected. Being completely connected does not mean that Mesh Network is dependant on each and every node of the network. Even if one node fails in the Mesh Network the network finds an alternate route to transfer the data. It is called the self healing technology where it receives data one way or the other. The Mesh Network is based on a very sensible concept and has lesser chances of a network breakdown. There are so many possible combinations of routes and hops a data transfer can take that it will reach the destination one way or the other. It is highly unlikely that all the nodes in a single Mesh Network will break down at any given point of time.

1.1.1 Wireless Mesh Networks


Wireless Mesh Networks work based on the radio frequencies and was originally developed by the army to be able to communicate. The reliability factor is high in any kind of Mesh Network. There are three types of wireless Mesh Topologies.

1.1.2 Fixed Mesh Networks


The fixed Mesh Networks will work only in the specified location and they are not mobile networks. They are meant to be used in a limited surrounding with boundaries. The location of nodes in affixed Mesh Network is all pre-determined and they are not interchangeable. The fixed Mesh Network does not work on line of sight like the other types of Mesh Networks. The
1

total number of hops in a fixed Mesh Network is usually fixed and also short. There may not be many nodes as these kinds of Mesh Networks exist within an office or building. More often than not the data travels ion a specific direction.

1.1.3 Peer to Peer Mobile Networks


In a peer to peer mobile network the individual devices connect to each other using the Mesh Network. The peer does not require connecting to the main node and they can still communicate from one device to another device by taking the shortest possible data transfer route. However many experts believe that in the peer to peer Mesh Networks the problems with scalability in terms of time taken for data transfer is questionable. The device has to know to transmit the data in the most optimal path and the entire data transfer or depends on this single factor. If the device is incapable then the whole purpose of using it in a peer to peer connection is lost.

1.1.4 Node-To-Node Network


A Node-To-Node network is a combination of fixed Mesh Network and the mobile Mesh Network. In the node to node network a network cloud is introduced and all the nodes are configured to use the network cloud to connect to each other. So this feature makes it mobile and also the network is fixed because all the nodes of the same network connect to one single network cloud.

CHAPTER 2 HISTORY OF MESH TOPOLOGY


2.1 History of Mesh Topology
A wireless mesh network has the core advantage of an inherent ability to form a network on power up. Watch what happens in Fig 1, when the mesh nodes power up (green LED on box turns on). The nodes hear each other's broadcast and form a network. Also watch what happens when a node fails and how the nodes discover an alternate routing path. This healing is fully automatic. Over the years, wireless mesh networking has seen three unique deployments based on radio technology, each incorporating iterative improvements allowing for greater scalability and higher network performance - both throughput and latency. This early stage of pre IEEE standard technological development is known as first Generation of Wireless Mesh. The following deployments are briefly described of various configurations of first generation Wireless Mesh Networking: Winrich Hoseit of Cologne, Germany first described the "DIRC technology" (digital inter relay communication) with PCT patent No. DE 197 37 897 and DE 197 33 586.Because transmitted radio waves always interfere, the ratio of carrier to interference first had to be worked out. Hoseit also discovered how to prevent latency by transmitting single symbols rather than digital packages. (symbol stream switching). Each node collaborates with its neighbor-nodes via a control channel (CCH) to choose the frequency, time and energy with which to transmit each symbol. Only the final destination "understands" the application with the lowest possible latency.

2.1 History of Mesh Topology in India


The Indian Financial Network [INFINET] is the communication backbone for the Indian Banking and Financial Sector. All banks in the public sector, private sector, cooperative, etc., and the premier financial institutions in the country are eligible to become members of the INFINET. The INFINET is a Closed User Group Network for the exclusive use of member banks and financial institutions and is the communication backbone for the National Payments
3

System, which caters mainly to inter-bank applications like RTGS, Delivery Vs. Payment , Government Transactions, Automatic Clearing House, etc.

CHAPTER 3 CONCEPT OF MESH TOPOLOGY


3.1 Concept Overview Mesh networking (topology) is a type of networking where each node must not only capture and disseminate its own data, but also serve as a relay for other nodes, that is, it must collaborate to propagate the data in the network. A mesh network can be designed using a flooding technique or a routing technique. When using a routing technique, the message is propagated along a path, by hopping from node to node until the destination is reached. To ensure all its paths' availability, a routing network must allow for continuous connections and reconfiguration around broken or blocked paths, using self-healing algorithms. A mesh network whose nodes are all connected to each other is a fully connected network. Mesh networks can be seen as one type of ad hoc network. Mobile ad hoc networks (MANET) and mesh networks are therefore closely related, but MANET also have to deal with the problems introduced by the mobility of the nodes. The self-healing capability enables a routing based network to operate when one node breaks down or a connection goes bad. As a result, the network is typically quite reliable, as there is often more than one path between a source and a destination in the network. Although mostly used in wireless situations, this concept is also applicable to wired networks and software interaction. Wireless mesh networks were originally developed for military applications. Mesh networks are typically wireless. Over the past decade, the size, cost, and power requirements of radios has declined, enabling multiple radios to be contained within a single device, i.e., mesh node, thus allowing for greater modularity; each can handle multiple frequency bands and support a variety of functions as neededsuch as client access, backhaul service, and scanning even customized sets of them. Work in this field has been aided by the use of game theory methods to analyze strategies for the allocation of resources and routing of packets.

3.2 Topology Types


The way in which the connections are made is called the topology of the computer network. Now I am discussing about network topology, Network topology specifically refers to the physical layout of the network, especially the locations of the computers and how the cable is run between them. Four most common topologies are:

Bus Star Ring Mesh

3.2.1 Bus Topology:


All the devices on a bus topology are connected by one single cable. When one computer sends a signal up the wire, all the computers on the network receive the information, but only one accepts the information. The rest regrets the message. One computer can send a message at a time. A computer must wait until the bus is free before it can transmit. When the signal reaches the end of the wire, it bounces back and travels back up the wire. When a signal echoes back and forth along an unterminated bus, it is called ringing. To stop the signals from ringing, attach terminators at either end of the segment. The terminators absorb the electrical energy and stop the reflection.

Fig. 3.1 Bus topologies

Advantage of Bus Network Topology

1. The bus is simple, reliable in small network, easy to use and understand 2. Requires the least amount of cable to connect the computers and less expensive 3. Easy to extend the bus

Disadvantage of network topology

1. Heavy network traffic can slow a bus considerably 2. Each barrel connector weakens the electrical signal 3. Difficult to troubleshoot a bus

3.2.2 Star Topology


All the cables run from the computers to a central location, where they are all connected by a device called a hub. Each computer on a star network communicates with a central hub that resends the message either to all the computers or only to the destination computers. Hub can be active or passive in the star network Active hub regenerates the electrical signal and sends it to all the computers connected to it. Passive hub does not amplify or regenerate signal and does not require electrical power to run. We can expand a star network by placing another star hub.

Fig. 3.2 Star Topology


7

Advantage of Star Network Topology

1. Center of a star net is a good place to diagnose network faults. 2. Single computer failure do not necessarily bring down the whole net. 3. Several cable types can be used with the hub.
1. 2.

Disadvantage of Star Network topology


Central hub fails, the whole network fails to operate. Many star networks require a device at the central point to rebroadcast or switch network traffic.

3.

Costs more for cabling in star net than bus.

3.2.3 Ring Topology


Each computer is connected to the next computer, with the last one connected to the first. Every computer is connected to the next computer in the ring, and each retransmits what it receives from the previous computer. The message flow around the ring in one direction. Some ring networks do token passing. It passes around the ring until a computer wishes to send information to another computer. The computer adds an electronic address and data and sends it around the ring. Each computer in sequence receives the token and the information and passes them to the next until either the electronic address matches the address of the computer or the token returns to the origin. The receiving computer returns a message to the originator indicating that the message has been received. The sending computer then creates another token and places it on the network, allowing another station to capture the token and being transmitted.

Fig. 3.3 Ring Topology


8

Advantage of Ring Network Topology


1. 2.

No computer can monopolize the network The fair sharing of the network allows the net to degrade gracefully as more users are added.

Disadvantage of Ring Network Topology


1. 2. 3.

Failure of one compute can affect the total network Difficult to troubleshoot Adding or removing Computers disrupts the network

3.2.4 Mesh Topology


The mesh topology connects all devices (nodes) to each other for redundancy and fault tolerance. It is used in WANs to interconnect LANs and for mission critical networks like those used by banks and financial institutions. Implementing the mesh topology is expensive and difficult.

Fig. 3.4 Mesh Topology

1. 2. 3. 1. 2.

Advantage of Mesh Network Topology


Fault tolerance. Guaranteed communication channel capacity. Easy to troubleshoot.

Disadvantage of Mesh Network Topology


Difficulty of installation and reconfiguration. Cost of maintaining redundant link.

10

CHAPTER 4 TECHNOLOGY INVOLVED IN MESH TOPOLOGY


4.1 Power minimizing techniques for full mesh topology optical IP networks:
In Optical IP networks the power consumption could be reduced via concepts known as Green photonics. Adhering to those principles, we use energy savings model which utilizes Hibernation mode approach and then investigate its impact on parameters like a wavelength request, blocking probability, and heat transfer rate. Trades-off between achieving energy savings and network crucial performance parameters are also investigated.

4.1.1 Corporate Intranet


Hearing first time the word intranet seemed that it was pronounced wrongly. The correct world is internet but then it dawns that the world is right and quite similar to internet yet different. Intranet is the amalgam of network and internet. Intranet is used in a closed network of an organization. Here comes the utility of not only networking but also connectivity to the internet. The most important thing is that a corporate is organized through this intranet. Many companies are growing on comparatively at a larger scale hence need a mode to communicate with different departments and offices. Corporate Intranet is designed to provide one platform to gather at this after regular intervals. Although different departments of a company were corresponded to each other through mailing on internet yet they need a private environment in which only business related activities can be monitored. Concept of corporate intranet revolutionized the business world. A number of employees, peaceful environment, ease of coordination, browsing for new trends and discussing upcoming events and difficulties call for the need of corporate intranet. There should be a network in which only work groups are allowed to share companys reports and data and also able to communicate through corporate internet for quick updates. A visible benefit of corporate intranet is that there is no need of printing and documentation so less use of office stationary. Now you can inform the employees about the next step through this medium and get feedback in the same manner. Saving the time is another positive feature of corporate intranet.

11

Monthly or weekly newsletter of the company provide you better opportunity to take a quick decision making step. This enables you to meet the demand of prospect customers.

4.1.2 Designing Corporate Intranet


So far designing a corporate intranet concerned few points should be considered as a basic infrastructure on which the actual building has to stand. The infrastructure is based on a closed network, internet. When all the employees are connected through networking in one group and sharing same internet protocol then corporate intranet designed. With the help of this intranet a corporate starts sharing one platform. Managing the different departments of corporate in a harmonized way so it should be user-friendly and this is the most important feature of corporate intranet design. A company with many branches in different cities can design this corporate intranet for it convenience and rapid development so that the company prosper by leaps and bounds.

4.1.3 Computer Network Security


Computer network + Security = Safe and sound Data Computer networking is the interconnectivity of two or more than two PCs in any environment. It enables to share files, resource sharing i.e. printers, fax, and storage devices etc. Where sharing / networking of many computers are useful there are chances of rising security issue. There is need to build such network which is security enabled from malwares to protect important data. It is an indubitable truth that placing everything in front will cause threat of robbery. So it is necessary to take precautionary measurements to avoid the loss of important data. There are many possible ways through which a computer network is attacked. These could be an internet access point or modems with dial-up connectivity. Here are some lines of attack you have to notice for securing your network. Installation of anti-virus software is very important for securing computer network. If one computer is affected with virus it will destroy the whole computer network by just switching on the computers in one network. Many folks are unaware that updating to the software new version is needed as there is possibility of new virus attack. An effective antivirus program is likely to be upgraded at time automatically. Also there is option that the computer is manually compromised so latest version of antivirus should be manually installed.

12

CHAPTER 5 VIRTUAL NODE ALGORITHM


We propose a virtual node algorithm that allows material to separate along arbitrary (possibly branched) piecewise linear paths through a mesh. The material within an element is fragmented by creating several replicas of the element and assigning a portion of real material to each replica. This results in elements that contain both real material and empty regions. The missing material is contained in another copy (or copies) of this element. Our new virtual node algorithm automatically determines the number of replicas and the assignment of material to each. Moreover, it provides the degrees of freedom required to simulate the partially or fully fragmented material in a fashion consistent with the embedded geometry. This approach enables efficient simulation of complex geometry with a simple mesh, i.e. the geometry need not align itself with element boundaries. It also alleviates many shortcomings of traditional Lagrangian simulation techniques for meshes with changing topology. For example, slivers do not require small CFL time step restrictions since they are embedded in well-shaped larger elements. To enable robust simulation of embedded geometry, we propose new algorithms for handling rigid body and self-collisions. In addition, we present several mechanisms for influencing and controlling fracture with grain boundaries, prescoring, etc. We illustrate our method for both volumetric and thin-shell simulations.

5.1 Locating Nodes


Node lookups can proceed asynchronously. The quantity of simultaneous lookups is denoted by and is typically three. A node initiates a FIND NODE request by querying to the nodes in its own k-buckets that are the closest ones to the desired key. When these recipient nodes receive the request, they will look in their k-buckets and return the k closest nodes to the desired key that they know. The requester will update a results list with the results (node ID's) he receives, keeping the k best ones (the k nodes that are closer to the searched key) that respond to queries.

13

5.2 Locating resources


Information is located by mapping it to a key. A hash is typically used for the map. The storer nodes will have information due to a previous STORE message. Locating a value follows the same procedure as locating the closest nodes to a key, except the search terminates when a node has the requested value in his store and returns this value. The values are stored at several nodes (k of them) to allow for nodes to come and go and still have the value available in some node. Periodically, a node that stores a value will explore the network to find the k nodes that are close to the key value and replicate the value onto them. This compensates for disappeared nodes.

5.3 Joining the network


A node that would like to join the net must first go through a bootstrap process. In this phase, the joining node needs to know the IP address and port of another node - a bootstrap node (obtained from the user, or from a stored list) - that is already participating in the Kademlia network. If the joining node has not yet participated in the network, it computes a random ID number that is supposed not to be already assigned to any other node. It uses this ID until leaving the network.

14

CHAPTER 6 CISCO UNIFIED WIRELESS NETWORK SOLUTION


6.1 Cisco Unified Wireless Network Solution Overview
The UWN is designed to provide 802.11 wireless networking solutions for enterprises and service providers. The Cisco UWN simplifies deploying and managing large-scale wireless LANs and enables a unique best-in-class security infrastructure. The operating system manages all data client, communications, and system administration functions, performs Radio Resource Management (RRM) functions, manages system-wide mobility policies using the operating system Security solution, and coordinates all security functions using the operating system security framework. The Cisco UWN consists of Cisco wireless LAN controllers and their associated Cisco lightweight access points controlled by the operating system. The Cisco UWN supports client data services, client monitoring and control, and all rogue access point detection, monitoring, and containment functions. The Cisco UWN uses Cisco lightweight access points, Cisco wireless LAN controllers, and the optional Cisco WCS to provide wireless services to enterprises and service providers.

6. 2 Cisco Mesh Networking Solution Overview


The mesh networking solution, which is part of the Cisco unified wireless network solution, enables two or more Cisco Aironet lightweight mesh access points (hereafter called mesh access points) to communicate with each other over one or more wireless hops to join multiple LANs or to extend 802.11b wireless coverage. Cisco mesh access points are configured, monitored, and operated from and through any Cisco wireless LAN controller deployed in the mesh networking solution. The mesh access points are programmed to investigate their environment when they boot up, and perform internal configuration based on whether or not the mesh access point has a wired connection to the LAN. When the mesh access point is wired to a wireless LAN

15

controller it auto-configures as a roof-top access point, and when the mesh access point is not wired to a wireless LAN controller it auto-configures as a pole-top access point. The mesh access points are also programmed to find and associate with their nearest neighbors when they boot up. Thus, pole-top access points associate with other pole-top access points and any roof-top access point that they find, and roof-top access points associate with other pole-top access points after associating with a wireless LAN controller. These two design features ensure that the mesh networking solution is self-healing when mesh access points are installed and when they recover from a power failure. In all deployments, the backhaul is carried from one mesh access point to another mesh access point across one 802.11 radio, while client access is provided by another 802.11 radio. This design ensures that the mesh networking solution throughput is minimally impacted by client traffic.

Typical Cisco Mesh Networking Solution Deployments


Supported mesh networking solution deployments are of one of three general types:

Point-to-Point Deployment Point-to-Multipoint Deployment Mesh Deployment

6.2.1 Point-to-Point Deployment


In this simplest configuration, the mesh access points provide wireless access and backhaul to wireless clients, and can simultaneously support bridging between one LAN and a termination to a remote Ethernet device or another Ethernet LAN.

Fig. 6.1 Point-to-Point Deployment


16

Cisco wireless LAN controller

2 LAN 1 access 1030 point: remote Cisco edge

Router or Switch Required 4 Roof-top when network is used for Aironet

bridging LAN at Point 2 and LAN at Point 7.

lightweight access point or Cisco Aironet 1500 series lightweight outdoor access point.

Wireless Backhaul

6 Pole-top access point Cisco Aironet 1030 remote edge lightweight

access point or Cisco Aironet 1500 series lightweight outdoor access point. (See Note)
7

Optional wired connection to 8 Wireless Clients. Ethernet termination device (such as a camera) or LAN 2; requires a Router or Switch at Point 3. (See Note)

Note Cisco Aironet 1030 remote edge lightweight access points and Cisco Aironet 1500 series lightweight outdoor access points support single-hop deployments. However, Cisco Aironet 1500 series lightweight outdoor access points are required to support multi-hop backhaul deployments.

6.2.2 Point-to-Multipoint Deployment


In this configuration, the mesh access points provide wireless access and backhaul to wireless clients, and can simultaneously support bridging between one LAN and one or more terminations to Ethernet devices or other Ethernet LANs. Shows a two-hop point-to-multipoint deployment. Regardless of the number of hops in the point-to-multipoint deployment, the mesh access points on each branch are configured to talk only with the mesh access points on their branch and not with mesh access points on other branches.

17

Fig. 6.2 Point-to-Multi-Point Deployment


18

1 Cisco controller

wireless

LAN 2 LAN 1

3 Router or SwitchRequired 4 Roof-top access point: Cisco Aironet when network is used for bridging LAN at Point 2 and LAN at Point 8 5 Wireless Backhaul 1030 remote edge lightweight access point or Cisco Aironet 1500 series lightweight outdoor access point 6 Pole-top access point: Cisco Aironet 1030 remote edge lightweight access point or Cisco Aironet 1500 series lightweight outdoor access point (See Note) 7 Pole-top access point: Cisco 8 Optional wired connection to Ethernet Aironet 1500 series termination device (such as a camera) or LAN 2; requires a Router or Switch at Point 3

lightweight outdoor access point (See Note) 9 Wireless clients

Note Cisco Aironet 1030 remote edge lightweight access points and Cisco Aironet 1500 series lightweight outdoor access points support single-hop deployments. However, Cisco Aironet 1500 series lightweight outdoor access points are required to support multi-hop backhaul deployments.

6.2.3 Mesh Deployment


In this configuration, the mesh access points provide wireless access and backhaul to wireless clients, and can simultaneously support bridging between one LAN and one or more terminations to Ethernet devices or other Ethernet LANs. Shows a typical mesh deployment. Regardless of the number of hops in the point-to-multipoint deployment, the mesh access

19

points on each branch are configured to talk to all other mesh access points within range in the deployment. Also, when any of the backhaul links fails, the mesh access points automatically reroute the traffic using another path. This results in a mesh networking solution that is selfconfiguring and self-healing.
1

Cisco

wireless

LAN 2 LAN 1

controller
3

Router

or

Switch

-- 4 Roof-top

access

point:

Required when network is used for bridging LAN at Point 2 and LAN at Point 7

Cisco Aironet 1030 remote edge lightweight access

point or Cisco Aironet 1500 series lightweight

outdoor access point

Wireless Backhaul

6 Pole-top

access

point:

Cisco Aironet 1500 series lightweight outdoor access point (Note)

Optional

wired 8 Wireless clients

connection to Ethernet termination device (such as a camera) or LAN 2; requires a Router or

Switch at Point 3

20

Fig. 6.3 Mesh Deployment

21

CHAPTER 7 ADVANTAGES

7.1Advantage of Mesh Topology:


1. Data can be transmitted from different devices simultaneously. This topology can withstand high traffic 2. Even if one of the components fails there is always an alternative present. So data transfer doesnt get affected. 3. Expansion and modification in topology can be done without disrupting other nodes.

22

CHAPTER 8 DISADVANTAGES
8.1 Disadvantages of Mesh Topology:

1. There are high chances of redundancy in many of the network connections. 2. Overall cost of this network is way too high as compared to other network topologies. 3. Set-up and maintenance of this topology is very difficult. Even administration of the
network is tough.

23

CHAPTER 9 LIMITATIONS

9.1 Limitations

If the network covers a great area, huge investments may be required due to the amount of cabling and ports required for input and output devices. It is a rare choice of a network connection due to the costs involved.

Implementation can be a very arduous task.

24

CHAPTER 10 FUTURE ASPECTS

10.1 Future Aspects


1. Point to point line configuration makes identification and isolation of faults easy. 2. Messages travel through a dedicated line meaning that only the intended recipient receives the message: privacy and security is thus ensured. 3. In the case of a fault in one link, only the communication between the two devices sharing the link is affected. 4. The use of dedicated links ensures that each connection carries its own data load thus ridding of traffic problems that would have been encountered if a connection/link was shared. 5. Since the message travels along dedicated link, mesh topology is more secure.

25

CHAPTER 11 CONCLUSION
In Mesh technology there is dedicated links for each node this eliminates the traffic problem.

Its robust if one link fails it does not affect the other links. Security and privacy due to dedicated links. Point-to-point links make fault identification easy. Each connection can have its own data load, so the traffic problem is eliminated. Each connection can have its own data load, so the traffic problem is eliminated. It has multiple links, so if one route is blocked then other routes can be used for data communication. Star topology is less expensive than a mesh topology as there are no dedicated links between nodes and each device needs only one link and one I/O ports to connect it to any number of nodes.

26

REFERENCES
1. http://en.wikipedia.org/wiki/Mesh Topology 2. ATIS Telecom Glossary 2007. Alliance for Telecommunications Industry Solutions. 3. http://www.atis.org/glossary/definition.aspx?id=3516. Retrieved 2008-10-10. 4. 3. Bicsi, B., (2002). Network Design Basics for Cabling Professionals. City: McGrawHill Professional. 5. Inc., S., (2002). Networking Complete. Third Edition. San Francisco: Sybex

27

You might also like