SlideShare une entreprise Scribd logo
1  sur  25
Télécharger pour lire hors ligne
Mesh Networks |
    Hacking The T3lc0 Model




            http://arig.org.il
                     
What's a Mesh Anyway ?
   Mesh = topology. anything not a star / bus / ring / tree
       Nodes = routers, smart phones, cars – anything wi-fi enabled
       Links = wireless connections
   Mesh Network Attributes:
       Self-organizing
       Self-healing
       Scalable
       Robust, hard to disconnect


                                         
Mesh Node Recipe

   1x 802.11 compatible radio device
   1x radio driver, eg. atheros
   1x Foss OS: eg. OpenWRT
   1x Mesh Protocol
       BGP, layer 7 ( uses TCP, port 179 ) &
        OSPF ( IP datagram encapsulated )
       OLSR, layer 3 ( uses UDP packets )
       B.A.T.M.A.N, layer 2 ( raw ethernet frames, kernel module)
                                     
Radio

   Use of public 2.4GHz & 5GHz bands
   No special license to operation
   3.7GHz also recently made available
   Open Spectrum: public radio frequency access



       Open Source Cell Phone Network at $2 per month
                              
Mesh Protocols
       Protocol Tasks:
           Node announcement
           Neighbor sensing
           Routing table upkeep
           Routing decisions
       Protocol Efficiency Metrics
            maximize: raw data
            minimize: control Data / ( control Data + raw Data )
       > 70 implementation, lots of academic Interest
                                             
The Problem

       Present Routers, No Inter-Communication
       Low Service Improvement Incentive
       Centralized Power, Censorship
       No Service Improvement Incentive
       Infrastructure Vulnerability:
           Crisis Scenarios
           Cellular Service Failure (Cellcom, 2010)
                                       
The Solution
        part of a Solution: Mesh Network

       Open Mesh:
           Open Source, Open Standards
           Affordable
       Community Owned
       User Operated
       Induce ISP Service Improvement (mozilla effect)
                               
History, by Device: WRT54G
   Story of the Source Code:
       1. Andrew Miklas posts on the Kernel Mailing List:
          # dd if=WRT54G_1.02.1_US_code.bin of=test.dump skip=24577c bs=32c
          # mount -t cramfs test.dump /mnt
       2. GPL requires Linksys to publish source code
       3. pressure...
       4. $$$ profit! : Linksys open sourced the WRT54G firmware in July 2003
   A 60$ turns into a 600$ corporate router !
   Unlocked features:
       shell access,
       run VPN / VoIP servers,
       use as a repeater or a bridge → mesh possible
                                             
History, by Device - XO-1
   100$ laptop per child Project
   Mesh to Provide Classroom & Village connectivity
   Partial 802.11s implementation ( no security for example )
   Plug-n-Play, at least in theory:
        # iwconfig msh0 mode ad-hoc channel 13 essid hello-mesh-world
        # ifconfig msh0 <IP address>
   Disappointing real-world performance
       Low powered radio → short range


                                           
History, by Network: Consume.net
   England, 2001, 1000+ list members, ~200 nodes
   Context: dialup, 512Kbps = $60,000
   Clink Street Building Internet Sharing:
      Artists, Photographers, Filmmakers, etc.
   Expand to 2nd building → cross a 5m wide street:
      running cables across the street is illegal !
   Buy a $4000 Breezecom AP10 ( 2Mbps, 100 users, 4 years uptime! )
   Low cost, 802.11b PCMCIA cards
   motto: Consume the net !

                                              
Pico-Peering Agreement

       Written by the Consume.net founders. Key points:
           Free Transit:
               Owner agrees to provide free transit across their free network.
               Owner agrees not to modify/interfere with data as it passes through their free network.
           Open Communication:
               The owner agrees to publish the information necessary for peering to take place
               This information shall be published under a free license
               The owner agrees to be contactable and will provide at least an email adress
           No Warranty
           Terms of Use:
               The owner is entitled to formulate an 'acceptable use policy'
               This may or may not contain information about additional services provided
                                                         
History, by Network: Freifunk
   Germany, 2002
   Context: Post Unification, East-Germany:
       Fiber Internet project:
          1. rip out all PSTN copper
          2. install fiber lines
       Project budget overrun → end users left with nothing !
   Early Start: PCs on rooftops
   Very fast adoption
   Active today, strong hacking culture

                                            
History, by Network: AWMN

       Greece, 2002
       Small group of dissatisfied tech'ies
       ~1120 backbone nodes, > 2500 ap clients
       DIY mentality




                                
History, by Network: Guifi.net

       Catalonia, 2004
       Context: poor Internet access in rural areas
       ~13.500 nodes - likely the biggest in the world
       Lots of accumulated experience
       Strong community back


                               
     
Mesh Network Services
       Network wide: IP assignment, DNS
       Mass Communication:
           VoIP
           Municipal Notification Service, e.g. Shderot
           Broadcast, Multicast: local radio, podcasts, etc.
       P2P services: file sharing, social networks
       Distributed Services: cache, backup, DNS
       Sensor Networks
                                         
In the News...
   Mediterranean, 2008: Submarine Cable Disruption
       5 ! cables cut
       Israel only connected with two
   Israel, Dec. 2010:
       Cellcom Service Downtime
   Egypt, Jan. 28 2011 ( see also: Yeman, Lybia, Syria ):
       Internet shutdown. nothing fancy, simply power off !
   Disruptions third world exclusive? no:
       Aug. 2011, San Francisco: BART cut cell service to avert protest
   US, 2011, State Department:
       spending > $70 million on “shadow networks”
                                             
Israel, 2011: Internet = '‫? קוטג‬
       Users forced into dual subscription: ‫,ספק, תשתית‬
        the only country !
       Slower speed = more money
       Private, al la 'NGN' style user separation




                                
‫'‪Israel, 2011: The 'Law‬‬

    ‫‪‬‬   ‫: תיקון חוק לשון הרע‬




                                   ‫חשיפת פרטי גולשים:‬   ‫‪‬‬




‫ ‬                              ‫ ‬
Are we happy with this
          design ?


               
‫פרוייקט אריג‬
       Israel is way behind - about ~10 years !
       Vision:
           Open, Community dedicated mesh
           ‫ =! אריג‬ISP
           ISP, ‫ אריג‬co-existence
           Community owned, operated
       Learn from past attempts
       Israeli housing protest: inter camp connection effort
       Global Cooperation - Funkfeuer.at:
           CNDB ( common node DB schema ) development
           Borrowed public IPv6 block    
Technical Challenges
       Spectrum Congestion
       Limited Wi-Fi Range
       Central Network Services:
              Node ID Assignment: IP / MAC
              DNS Servers
       Layer 8: User Resource Sharing

                                     
Sustainability is Key
    ++node operators, not nodes.
    ++mesh communities, not mesh networks.




                      
Security

       OpenWRT Dual-Mode:
           WPA enabled private network
           Ad-hoc public network
       Is an open AP really a security risk ?
       Preventing, dealing with abuse
       Security at the protocol level: GNUnet
                                     
The End,
    Thank You
     http://arig.org.il




              

Contenu connexe

Tendances

Chapter 8 lan_technologies_and_network_topology
Chapter 8 lan_technologies_and_network_topologyChapter 8 lan_technologies_and_network_topology
Chapter 8 lan_technologies_and_network_topology
Aman Jaiswal
 
Wireless mesh network (2)
Wireless mesh network (2)Wireless mesh network (2)
Wireless mesh network (2)
Jyoti Yadav
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
jpprakash
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
projectteach
 
Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networks
Salahuddin Jokhio
 

Tendances (20)

Chapter 8 lan_technologies_and_network_topology
Chapter 8 lan_technologies_and_network_topologyChapter 8 lan_technologies_and_network_topology
Chapter 8 lan_technologies_and_network_topology
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks
 
Wireless network (cellular network architecture and http.)
Wireless network (cellular network architecture and http.)Wireless network (cellular network architecture and http.)
Wireless network (cellular network architecture and http.)
 
Computer networks lan
Computer networks lanComputer networks lan
Computer networks lan
 
VLAN -VIRTUAL LAN -COMPUTER NETWORKS
VLAN -VIRTUAL LAN -COMPUTER NETWORKSVLAN -VIRTUAL LAN -COMPUTER NETWORKS
VLAN -VIRTUAL LAN -COMPUTER NETWORKS
 
Wireless mesh network (2)
Wireless mesh network (2)Wireless mesh network (2)
Wireless mesh network (2)
 
Lan architecture
Lan architectureLan architecture
Lan architecture
 
Lan wan
Lan wanLan wan
Lan wan
 
LAN TECHNOLOGIES
LAN TECHNOLOGIESLAN TECHNOLOGIES
LAN TECHNOLOGIES
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Local area network
Local area networkLocal area network
Local area network
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Advance Networking Course Details PPT
Advance Networking Course Details PPTAdvance Networking Course Details PPT
Advance Networking Course Details PPT
 
Lan basic
Lan basicLan basic
Lan basic
 
Adhoc technologies
Adhoc technologiesAdhoc technologies
Adhoc technologies
 
Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networks
 

En vedette

Network topology....sajal
Network topology....sajalNetwork topology....sajal
Network topology....sajal
Sajal Das
 

En vedette (16)

802.15.5 mesh topology
802.15.5  mesh topology802.15.5  mesh topology
802.15.5 mesh topology
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Mesh topology
Mesh topologyMesh topology
Mesh topology
 
Mesh Topology
Mesh Topology Mesh Topology
Mesh Topology
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
 
Market dynamics
Market dynamicsMarket dynamics
Market dynamics
 
How do you_honeycomb_android_for_tablets
How do you_honeycomb_android_for_tabletsHow do you_honeycomb_android_for_tablets
How do you_honeycomb_android_for_tablets
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
MobiMESH: Mesh Evolution
MobiMESH: Mesh EvolutionMobiMESH: Mesh Evolution
MobiMESH: Mesh Evolution
 
Honeycomb User Interface Design @iRajLal
Honeycomb User Interface Design @iRajLalHoneycomb User Interface Design @iRajLal
Honeycomb User Interface Design @iRajLal
 
Introducing Honeycomb
Introducing HoneycombIntroducing Honeycomb
Introducing Honeycomb
 
Network topology....sajal
Network topology....sajalNetwork topology....sajal
Network topology....sajal
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
HV Circuit Breaker Testing
HV Circuit Breaker TestingHV Circuit Breaker Testing
HV Circuit Breaker Testing
 
Physical and logical topologies in computer network and client server
Physical  and logical topologies in computer network and client serverPhysical  and logical topologies in computer network and client server
Physical and logical topologies in computer network and client server
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
 

Similaire à Mesh network presentation

Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital Security
Lindsey Jones
 
9-29-15 IEEE-CVT Presentation by EH-Final
9-29-15 IEEE-CVT Presentation by EH-Final9-29-15 IEEE-CVT Presentation by EH-Final
9-29-15 IEEE-CVT Presentation by EH-Final
Ed Hightower
 
Module1 introduction to network
Module1 introduction to networkModule1 introduction to network
Module1 introduction to network
Miz Malinz
 
Nt1310 Unit 8 Network Components
Nt1310 Unit 8 Network ComponentsNt1310 Unit 8 Network Components
Nt1310 Unit 8 Network Components
Lisa Williams
 
This course introduces students to issues in IT infrastructu.docx
This course introduces students to issues in IT infrastructu.docxThis course introduces students to issues in IT infrastructu.docx
This course introduces students to issues in IT infrastructu.docx
christalgrieg
 

Similaire à Mesh network presentation (20)

Computer networks short note (version 8)
Computer networks short note (version 8)Computer networks short note (version 8)
Computer networks short note (version 8)
 
Ethernet and LIFI
Ethernet and LIFIEthernet and LIFI
Ethernet and LIFI
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital Security
 
CBSE XII Communication And Network Concepts
CBSE XII Communication And Network ConceptsCBSE XII Communication And Network Concepts
CBSE XII Communication And Network Concepts
 
Chapter1 intro
Chapter1 introChapter1 intro
Chapter1 intro
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
COMPUTER NETWORKING.pptx
COMPUTER NETWORKING.pptxCOMPUTER NETWORKING.pptx
COMPUTER NETWORKING.pptx
 
9-29-15 IEEE-CVT Presentation by EH-Final
9-29-15 IEEE-CVT Presentation by EH-Final9-29-15 IEEE-CVT Presentation by EH-Final
9-29-15 IEEE-CVT Presentation by EH-Final
 
802. 11A Standard Essay
802. 11A Standard Essay802. 11A Standard Essay
802. 11A Standard Essay
 
Module1 introduction to network
Module1 introduction to networkModule1 introduction to network
Module1 introduction to network
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt
 
5G 2
5G 25G 2
5G 2
 
Chapter1
Chapter1Chapter1
Chapter1
 
Lecture 1 4
Lecture 1 4Lecture 1 4
Lecture 1 4
 
Networking
NetworkingNetworking
Networking
 
Basic networking 07-2012
Basic networking 07-2012Basic networking 07-2012
Basic networking 07-2012
 
Nt1310 Unit 8 Network Components
Nt1310 Unit 8 Network ComponentsNt1310 Unit 8 Network Components
Nt1310 Unit 8 Network Components
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
This course introduces students to issues in IT infrastructu.docx
This course introduces students to issues in IT infrastructu.docxThis course introduces students to issues in IT infrastructu.docx
This course introduces students to issues in IT infrastructu.docx
 

Plus de Iftach Ian Amit

"Cyber" security - all good, no need to worry?
"Cyber" security - all good, no need to worry?"Cyber" security - all good, no need to worry?
"Cyber" security - all good, no need to worry?
Iftach Ian Amit
 
Passwords good badugly181212-2
Passwords good badugly181212-2Passwords good badugly181212-2
Passwords good badugly181212-2
Iftach Ian Amit
 
Cheating in Computer Games
Cheating in Computer GamesCheating in Computer Games
Cheating in Computer Games
Iftach Ian Amit
 

Plus de Iftach Ian Amit (20)

Cyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLVCyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLV
 
Devsecops at Cimpress
Devsecops at CimpressDevsecops at Cimpress
Devsecops at Cimpress
 
BSidesTLV Closing Keynote
BSidesTLV Closing KeynoteBSidesTLV Closing Keynote
BSidesTLV Closing Keynote
 
Social Media Risk Metrics
Social Media Risk MetricsSocial Media Risk Metrics
Social Media Risk Metrics
 
ISTS12 Keynote
ISTS12 KeynoteISTS12 Keynote
ISTS12 Keynote
 
From your Pocket to your Heart and Back
From your Pocket to your Heart and BackFrom your Pocket to your Heart and Back
From your Pocket to your Heart and Back
 
Painting a Company Red and Blue
Painting a Company Red and BluePainting a Company Red and Blue
Painting a Company Red and Blue
 
"Cyber" security - all good, no need to worry?
"Cyber" security - all good, no need to worry?"Cyber" security - all good, no need to worry?
"Cyber" security - all good, no need to worry?
 
Armorizing applications
Armorizing applicationsArmorizing applications
Armorizing applications
 
Seeing Red In Your Future?
Seeing Red In Your Future?Seeing Red In Your Future?
Seeing Red In Your Future?
 
Hacking cyber-iamit
Hacking cyber-iamitHacking cyber-iamit
Hacking cyber-iamit
 
Passwords good badugly181212-2
Passwords good badugly181212-2Passwords good badugly181212-2
Passwords good badugly181212-2
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Sexy defense
Sexy defenseSexy defense
Sexy defense
 
Cyber state
Cyber stateCyber state
Cyber state
 
Advanced Data Exfiltration - the way Q would have done it
Advanced Data Exfiltration - the way Q would have done itAdvanced Data Exfiltration - the way Q would have done it
Advanced Data Exfiltration - the way Q would have done it
 
Infecting Python Bytecode
Infecting Python BytecodeInfecting Python Bytecode
Infecting Python Bytecode
 
Exploiting Second life
Exploiting Second lifeExploiting Second life
Exploiting Second life
 
Dtmf phreaking
Dtmf phreakingDtmf phreaking
Dtmf phreaking
 
Cheating in Computer Games
Cheating in Computer GamesCheating in Computer Games
Cheating in Computer Games
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

Mesh network presentation

  • 1. Mesh Networks | Hacking The T3lc0 Model http://arig.org.il    
  • 2. What's a Mesh Anyway ?  Mesh = topology. anything not a star / bus / ring / tree  Nodes = routers, smart phones, cars – anything wi-fi enabled  Links = wireless connections  Mesh Network Attributes:  Self-organizing  Self-healing  Scalable  Robust, hard to disconnect    
  • 3. Mesh Node Recipe  1x 802.11 compatible radio device  1x radio driver, eg. atheros  1x Foss OS: eg. OpenWRT  1x Mesh Protocol  BGP, layer 7 ( uses TCP, port 179 ) & OSPF ( IP datagram encapsulated )  OLSR, layer 3 ( uses UDP packets )  B.A.T.M.A.N, layer 2 ( raw ethernet frames, kernel module)    
  • 4. Radio  Use of public 2.4GHz & 5GHz bands  No special license to operation  3.7GHz also recently made available  Open Spectrum: public radio frequency access   Open Source Cell Phone Network at $2 per month    
  • 5. Mesh Protocols  Protocol Tasks:  Node announcement  Neighbor sensing  Routing table upkeep  Routing decisions  Protocol Efficiency Metrics maximize: raw data minimize: control Data / ( control Data + raw Data )  > 70 implementation, lots of academic Interest    
  • 6. The Problem  Present Routers, No Inter-Communication  Low Service Improvement Incentive  Centralized Power, Censorship  No Service Improvement Incentive  Infrastructure Vulnerability:  Crisis Scenarios  Cellular Service Failure (Cellcom, 2010)    
  • 7. The Solution part of a Solution: Mesh Network  Open Mesh:  Open Source, Open Standards  Affordable  Community Owned  User Operated  Induce ISP Service Improvement (mozilla effect)    
  • 8. History, by Device: WRT54G  Story of the Source Code:  1. Andrew Miklas posts on the Kernel Mailing List: # dd if=WRT54G_1.02.1_US_code.bin of=test.dump skip=24577c bs=32c # mount -t cramfs test.dump /mnt  2. GPL requires Linksys to publish source code  3. pressure...  4. $$$ profit! : Linksys open sourced the WRT54G firmware in July 2003  A 60$ turns into a 600$ corporate router !  Unlocked features:  shell access,  run VPN / VoIP servers,    use as a repeater or a bridge → mesh possible  
  • 9. History, by Device - XO-1  100$ laptop per child Project  Mesh to Provide Classroom & Village connectivity  Partial 802.11s implementation ( no security for example )  Plug-n-Play, at least in theory: # iwconfig msh0 mode ad-hoc channel 13 essid hello-mesh-world # ifconfig msh0 <IP address>  Disappointing real-world performance  Low powered radio → short range    
  • 10. History, by Network: Consume.net  England, 2001, 1000+ list members, ~200 nodes  Context: dialup, 512Kbps = $60,000  Clink Street Building Internet Sharing: Artists, Photographers, Filmmakers, etc.  Expand to 2nd building → cross a 5m wide street: running cables across the street is illegal !  Buy a $4000 Breezecom AP10 ( 2Mbps, 100 users, 4 years uptime! )  Low cost, 802.11b PCMCIA cards  motto: Consume the net !    
  • 11. Pico-Peering Agreement  Written by the Consume.net founders. Key points:  Free Transit:  Owner agrees to provide free transit across their free network.  Owner agrees not to modify/interfere with data as it passes through their free network.  Open Communication:  The owner agrees to publish the information necessary for peering to take place  This information shall be published under a free license  The owner agrees to be contactable and will provide at least an email adress  No Warranty  Terms of Use:  The owner is entitled to formulate an 'acceptable use policy'  This may or may not contain information about additional services provided    
  • 12. History, by Network: Freifunk  Germany, 2002  Context: Post Unification, East-Germany:  Fiber Internet project: 1. rip out all PSTN copper 2. install fiber lines  Project budget overrun → end users left with nothing !  Early Start: PCs on rooftops  Very fast adoption  Active today, strong hacking culture    
  • 13. History, by Network: AWMN  Greece, 2002  Small group of dissatisfied tech'ies  ~1120 backbone nodes, > 2500 ap clients  DIY mentality    
  • 14. History, by Network: Guifi.net  Catalonia, 2004  Context: poor Internet access in rural areas  ~13.500 nodes - likely the biggest in the world  Lots of accumulated experience  Strong community back    
  • 15.    
  • 16. Mesh Network Services  Network wide: IP assignment, DNS  Mass Communication:  VoIP  Municipal Notification Service, e.g. Shderot  Broadcast, Multicast: local radio, podcasts, etc.  P2P services: file sharing, social networks  Distributed Services: cache, backup, DNS  Sensor Networks    
  • 17. In the News...  Mediterranean, 2008: Submarine Cable Disruption  5 ! cables cut  Israel only connected with two  Israel, Dec. 2010:  Cellcom Service Downtime  Egypt, Jan. 28 2011 ( see also: Yeman, Lybia, Syria ):  Internet shutdown. nothing fancy, simply power off !  Disruptions third world exclusive? no:  Aug. 2011, San Francisco: BART cut cell service to avert protest  US, 2011, State Department:  spending > $70 million on “shadow networks”    
  • 18. Israel, 2011: Internet = '‫? קוטג‬  Users forced into dual subscription: ‫,ספק, תשתית‬ the only country !  Slower speed = more money  Private, al la 'NGN' style user separation    
  • 19. ‫'‪Israel, 2011: The 'Law‬‬ ‫‪‬‬ ‫: תיקון חוק לשון הרע‬ ‫חשיפת פרטי גולשים:‬ ‫‪‬‬ ‫ ‬ ‫ ‬
  • 20. Are we happy with this design ?    
  • 21. ‫פרוייקט אריג‬  Israel is way behind - about ~10 years !  Vision:  Open, Community dedicated mesh  ‫ =! אריג‬ISP  ISP, ‫ אריג‬co-existence  Community owned, operated  Learn from past attempts  Israeli housing protest: inter camp connection effort  Global Cooperation - Funkfeuer.at:  CNDB ( common node DB schema ) development    Borrowed public IPv6 block  
  • 22. Technical Challenges  Spectrum Congestion  Limited Wi-Fi Range  Central Network Services:  Node ID Assignment: IP / MAC  DNS Servers  Layer 8: User Resource Sharing    
  • 23. Sustainability is Key ++node operators, not nodes. ++mesh communities, not mesh networks.    
  • 24. Security  OpenWRT Dual-Mode:  WPA enabled private network  Ad-hoc public network  Is an open AP really a security risk ?  Preventing, dealing with abuse  Security at the protocol level: GNUnet    
  • 25. The End, Thank You http://arig.org.il