Skip to main content
Top

2015 | OriginalPaper | Chapter

10. CLOSENET—Mesh Wi-Fi in Areas of Remote Connectivity

Authors : Sriragh Karat, Sayantani Goswami, Aparna Sridhar, Aakash Pathak, D. S. Sachin, K. S. Sahana, Viswanath Talasila, H. S. Jamadagni

Published in: Systems Thinking Approach for Social Problems

Publisher: Springer India

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The availability of high-speed network connectivity in Indian villages can have significant socioeconomic impact. This can have a positive influence on many aspects of development such as telemedicine, smart agriculture, and education among others. In this paper, we describe our attempts to develop and deploy CLOSENET, a wireless mesh network (WMN) in rural areas facing insufficient network coverage. The network topology is chosen based on a case study on a specific village (C.K.Pura in Tumkur, Karnataka), taking several constraints into account such as terrain interference, population of users, and available power sources. We analyze factors such as normalized routing load, packet delivery ratio, data throughput, and data latency in order to demonstrate the efficiency, reliability, and durability of the network through a simulation model developed using the NS2 simulation tool. Advanced reactive routing protocols such as the ad hoc on-demand distance vector (AODV) have been chosen in order to guarantee good performance in terms of scalability, reliability, throughput, load balancing, congestion control, and efficiency. Furthermore, the terrain is mapped onto an appropriate attenuation model implemented in NS2; this helps decide the throughput and latencies at each node, as well as the number of nodes required to obtain acceptable data transfer rates. The network is self-adaptive in nature. The work presented in the paper is a part of a planned long-term initiative to develop connectivity in remote areas, which will have significant benefits to society.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Aad I, Hubaux J-P, Knightly EW (2008) Impact of denial of service attacks on ad hoc networks. IEEE/ACM Trans Networking 16(4):791–802 Aad I, Hubaux J-P, Knightly EW (2008) Impact of denial of service attacks on ad hoc networks. IEEE/ACM Trans Networking 16(4):791–802
2.
go back to reference Akyildiz IF, Wang X, Wang W (2005) Wireless mesh networks: a survey. Comput Netw 47(4):445–487CrossRefMATH Akyildiz IF, Wang X, Wang W (2005) Wireless mesh networks: a survey. Comput Netw 47(4):445–487CrossRefMATH
3.
go back to reference Akyildiz IF et al (2006) Next generation dynamic spectrum access cognitive radio wireless networks: a survey. Comput Netw 50(13):2127–2159 Akyildiz IF et al (2006) Next generation dynamic spectrum access cognitive radio wireless networks: a survey. Comput Netw 50(13):2127–2159
4.
go back to reference Cerri D, Ghioni A (2008) Securing AODV: the A-SAODV secure routing prototype. IEEE Commun Mag 46(2):120–125CrossRef Cerri D, Ghioni A (2008) Securing AODV: the A-SAODV secure routing prototype. IEEE Commun Mag 46(2):120–125CrossRef
5.
go back to reference Chakeres ID, Belding-Royer EM (2004) AODV routing protocol implementation design. In: Proceedings of the 24th international conference on distributed computing systems workshops, pp 698–703. IEEE, 2004 Chakeres ID, Belding-Royer EM (2004) AODV routing protocol implementation design. In: Proceedings of the 24th international conference on distributed computing systems workshops, pp 698–703. IEEE, 2004
6.
go back to reference Chen, J-W et al (2003) Teledentistry and its use in dental education. J Am Dent Assoc 134(3):342–346 Chen, J-W et al (2003) Teledentistry and its use in dental education. J Am Dent Assoc 134(3):342–346
7.
go back to reference Clark GT (2000) Teledentistry: what is it now, and what will it be tomorrow? J Calif Dent Assoc 28(2):121 Clark GT (2000) Teledentistry: what is it now, and what will it be tomorrow? J Calif Dent Assoc 28(2):121
8.
go back to reference Hassan YK, El-Aziz MHA, El-Radi ASA (2010) Performance evaluation of mobility speed over MANET routing protocols. Int J Netw Secur 11(3):128–138 Hassan YK, El-Aziz MHA, El-Radi ASA (2010) Performance evaluation of mobility speed over MANET routing protocols. Int J Netw Secur 11(3):128–138
9.
go back to reference Hossain E, Leung KK (eds) (2008) Wireless mesh networks: architectures and protocols. Springer, Berlin Hossain E, Leung KK (eds) (2008) Wireless mesh networks: architectures and protocols. Springer, Berlin
10.
go back to reference Huhtonen A (2004) Comparing AODV and OLSR routing protocols. In: Seminar on internetworking, Sjkulla, pp 26–27 Huhtonen A (2004) Comparing AODV and OLSR routing protocols. In: Seminar on internetworking, Sjkulla, pp 26–27
11.
go back to reference McDaniel P, McLaughlin S (2009) Security and privacy challenges in the smart grid. IEEE Secur Priv 7(3):75–77CrossRef McDaniel P, McLaughlin S (2009) Security and privacy challenges in the smart grid. IEEE Secur Priv 7(3):75–77CrossRef
12.
go back to reference Natesapillai K, Palanisamy V, Duraiswamy K (2009) A performance evaluation of proactive and reactive protocols using NS2 simulation. Int J Eng Res Ind Appl 2(11):309–326 Natesapillai K, Palanisamy V, Duraiswamy K (2009) A performance evaluation of proactive and reactive protocols using NS2 simulation. Int J Eng Res Ind Appl 2(11):309–326
15.
go back to reference Royer EM, Toh C-K (1999) A review of current routing protocols for ad hoc mobile wireless networks. IEEE Pers Commun 6(2):46–55CrossRef Royer EM, Toh C-K (1999) A review of current routing protocols for ad hoc mobile wireless networks. IEEE Pers Commun 6(2):46–55CrossRef
16.
go back to reference Sen J (2013) Security and privacy issues in wireless mesh networks: a survey. In: Wireless networks and security, pp 189–272. Springer, Berlin Sen J (2013) Security and privacy issues in wireless mesh networks: a survey. In: Wireless networks and security, pp 189–272. Springer, Berlin
17.
go back to reference Seyedzadegan M et al (2011) Wireless mesh networks: WMN overview, WMN architecture. In: International conference on communication engineering and networks IPCSIT, vol 19 Seyedzadegan M et al (2011) Wireless mesh networks: WMN overview, WMN architecture. In: International conference on communication engineering and networks IPCSIT, vol 19
18.
go back to reference Yi P et al (2006) Flooding attack and defence in ad hoc networks. J Syst Eng Electron 17(2):410–416CrossRefMATH Yi P et al (2006) Flooding attack and defence in ad hoc networks. J Syst Eng Electron 17(2):410–416CrossRefMATH
19.
go back to reference Yi P et al (2010) A survey on security in wireless mesh networks. IETE Tech Rev 27(1):6CrossRef Yi P et al (2010) A survey on security in wireless mesh networks. IETE Tech Rev 27(1):6CrossRef
20.
go back to reference Zapata MG, Asokan N (2002) Securing ad hoc routing protocols. In: Proceedings of the 1st ACM workshop on wireless security. ACM, Atlanta Zapata MG, Asokan N (2002) Securing ad hoc routing protocols. In: Proceedings of the 1st ACM workshop on wireless security. ACM, Atlanta
Metadata
Title
CLOSENET—Mesh Wi-Fi in Areas of Remote Connectivity
Authors
Sriragh Karat
Sayantani Goswami
Aparna Sridhar
Aakash Pathak
D. S. Sachin
K. S. Sahana
Viswanath Talasila
H. S. Jamadagni
Copyright Year
2015
Publisher
Springer India
DOI
https://doi.org/10.1007/978-81-322-2141-8_10

Premium Partner