A mesh network is a LAN (usually wireless) where each node is connected to many others, configured to allow connections to be rerouted around broken or blocked paths, with the signal hopping from node to node until it reaches its destination. Mesh networks are self-healing and very reliable.
QuickStudy: Mesh networks
These self-healing nets are fast and reliable
Computerworld - In most modern networks, links and nodes are interconnected (both logically and physically) in either a star arrangement (with each node connected directly to a central switch, hub or server) or a bus configuration (with each node attached to a central line that is connected to a central switching component). Both of these configurations are well understood, inexpensive and generally reliable, but one broken link in either setup can isolate a node, cutting it off from the network.
A newer arrangement, mesh networking, connects each node to at least two other nodes (and potentially to each and every other network node, an arrangement referred to as "fully connected"). This involves more cabling (or more wireless devices) and greater overhead, but it allows the network to heal itself automatically when a break occurs, so there's no interruption of service to any node.
The lack of a hub-and-spoke structure is what distinguishes a mesh network. Also, meshes don't need designated routers; instead, nodes serve as routers for one another. Thus, data is passed from node to node in a process called hopping.
The first and best example of a mesh network is the Internet itself. Information travels across the Net by being forwarded automatically from one router to the next until it reaches its destination. The Internet is often depicted as a "cloud" because there are billions of potential paths a signal can take, and it's impossible to predict in advance what that route will be.
Wireless networking is an ideal vehicle for setting up a mesh network, because it can be done quickly and on an ad hoc basis. Wireless mesh nodes are small radio transmitters that function much like wireless routers, using existing Wi-Fi standards (802.11a, b and g) for communications.
Even in a wireless mesh network, you need a wired access point to reach the Internet. Getting that information back to the access point is called backhaul. Small wireless mesh networks handle backhaul without any special configuration. For larger mesh networks, however, such as those designed for cities or large enterprises, certain nodes must be dedicated as backhaul nodes. The other nodes send all outgoing information to a backhaul node, which sends it to the wired access point without extra hops.
Mesh in Action
In 2007, preparing for the annual Muslim pilgrimage to Mecca, Saudi Arabia's Communications and Information Technology Commission asked Internet service provider Bayanat Al-Oula to create a temporary wireless network and provide the 2 million pilgrims with free Internet connectivity. They chose a network of about 70 meshed routers and rolled it out in less than 60 days.
Kay is a Computerworld contributing writer in Worcester, Mass. Contact him at email@example.com.
For a complete archive of QuickStudies, go to computerworld.com/quickstudies
Read more about Mobile/Wireless in Computerworld's Mobile/Wireless Topic Center.
- Securing Mobile App Data - Comparing Containers and App Wrappers Analysts agree that Mobile Device Management (MDM) is not enough when it comes to securing app data. Although it remains a critical component...
- 3G/4G Digital Signage Guide Today, the widespread availability of 3G and 4G cellular or wireless broadband networks enables digital signage to be deployed virtually anywhere.
- Enterprises in Motion: In-Vehicle Networks In a world where traditional tethers to the central office have all but vanished, enterprises that operate vehicle fleets require constant and dependable...
- Uninterrupted Internet: Maximizing Revenue and Minimizing Business Risk with 3G/4G Failover Whether your businesses are connected to the Internet via T1/T3, or Cable, incorporating a mobile broadband backup solution adds uptime whenever there is...
- Don't Believe the Hype: Not All Containers are Created Equal Hear executives discuss the 3 C's of Secure Mobility-content, credentials, and configurations-and learn the inherent security risks to your organization of using MDM...
- Navigating the New Wireless Landscape Thriving in the new wireless landscape View Now>> All Mobile/Wireless White Papers | Webcasts