Advertisement

Constructing an Innovative, Economical, and Secure Wireless Mesh Network: Comparing OSPF and RIP

  • A. McCluskeyEmail author
  • A. Adekunle
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 797)

Abstract

Since the invention of the Internet, the number of users has been growing exponentially. The second largest continent regarding population is Africa, however, Africa is ranked fourth with the number of Internet users that Africa has, despite being and is ranked last regarding the percentage of Internet users to the population of Africa, which is 31.2%. For this paper, Swaziland will be used as example for an impoverished country in Africa. The contribution of this paper regards to the Raspberry Pi, RIP, and wireless authentication. In this paper, implementation of wireless mesh network using four Raspberry Pi’s is presented. However, since there are two suitable routing protocols that use two different algorithms, OSPF and RIP both are analyzed to see which of the routing protocols is best suited to this papers’ network. For the experiments, ping and fault tolerance was used to compare OSPF and RIP while also using different devices from different ends of the network. Though RIP has been sidelined by major companies and organizations, the experimental results show that RIP was best suited in the context of this paper’s wireless mesh network.

Keywords

Wireless mesh networks Routing protocols Network topology 

References

  1. 1.
    Internet usage statistics: the big picture: world internet users and 2017 population stats, 3 December 2017. [Online]. Available: http://www.internetworldstats.com/stats.htm. Accessed 11 Jan 2018
  2. 2.
    Farrell G, Isaacs S, Trucano M (2007) Survey of ICT and Education in Africa: A Summary Report, Based on 53 Country Surveys. infoDev, Washington, D.C., USAGoogle Scholar
  3. 3.
    Chrast L, Knaperek J, Kovalcik M (2014) Bandwidth aggregation of mobile broadband links on Raspberry Pi based access point. Halmstad University, HalmstadGoogle Scholar
  4. 4.
    Building beyond: a trade school in Swaziland, Africa, 6 November 2012. [Online]. Available: https://swazischool.wordpress.com/. Accessed 11 Jan 2018
  5. 5.
    Oda T, Yamada M, Obukata R, Barolli L, Woungang I, Takizawa M (2016) Experimental results of a Raspberry Pi based wireless mesh network Testbed considering TCP and LoS scenario. In: 10th International conference on complex, intelligent, and software intensive systemsGoogle Scholar
  6. 6.
    Yehia M, Kamel MA (2016) Comparison between network topologiesGoogle Scholar
  7. 7.
    Malkin G (1998) RIP Version 2, November 1998. [Online]. Available: https://tools.ietf.org/html/rfc2453. Accessed 25 Jan 2018
  8. 8.
    Moy J (1991) OSPF Version 2, July 1991. [Online]. Available: https://tools.ietf.org/html/rfc1247. Accessed 25 Jan 2018
  9. 9.
    Retana A, White R, Slice D (2000) EIGRP for IP: basic operation and configuration. Pearson EducationGoogle Scholar
  10. 10.
    Ciampa M (2006) CWSP guide to wireless security. In: CWSP guide to wireless security. Cengage Learning, p 302Google Scholar
  11. 11.
    Port numbers for SSH and Telnet connections in NSM overview, 2 January 2013. [Online]. Available: https://www.juniper.net/documentation/en_US/nsm2012.2/topics/concept/security-service-port-number-ssh-telnet-connection-nsm-overview.html. Accessed 12 Jan 2018
  12. 12.
    mashlol, notify, 3 December 2016. [Online]. Available: https://github.com/mashlol/notify/blob/master/server/server.js. Accessed 12 Jan 2018
  13. 13.

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.University of GreenwichChathamUK

Personalised recommendations