Professional Documents
Culture Documents
Research1111
Research1111
Research1111
Group Assignment
Name ID/NO
Adisu Admasu……………………………………………………0113
Ahmed Ali…………………………………………………….……0122
Fikremariam mitiku.…...………..…………………………0647
Wuletaw Yihun…….………………………………………….0258
Dursa Shamshadin…………………………….……………1292
Alemnew Menan……………………………..………………3021
I
Acknowledgment
First and for most, I would like to thanks the almightily “God” who help me by every
direction. Secondly I would like to reward my deepest gratitude to my Teacher Dr. Daniel
who has provided his wise and intellectuals advice, guidance and directive to make this
paper. Third my appreciation goes to Debra Tabor University, for giving me this chance to
prepare a paper on accounting for the course research methode. At last but not least I am also
appreciating to all my group member typing this research.
II
CHAPTER ONE
1.1 Introduction
Reliable communication systems have become essential for communities, especially in areas
with limited or no internet access. Traditional methods like landlines and cellular networks
often fall short in providing comprehensive coverage and resilience during emergencies or in
remote locations. The rise of the internet has brought new digital capabilities, but also
revealed vulnerabilities when connectivity is disrupted.
One promising solution is mesh networking - decentralized, peer-to-peer systems that allow
devices to connect directly, forming a self-organizing and self-healing network. Unlike
client-server architectures, mesh networks do not rely on a central point of failure, making
them more resilient and adaptable. This technology holds the potential to empower local
communities to stay connected, share vital information, and coordinate emergency response
efforts, even without internet access.
1
How can the mesh network architecture be optimized for reliable data
transmission and low latency without internet connectivity?
What features and functionalities are necessary to ensure the offline mesh network
communication system is user-friendly, secure, and resilient?
What user interface and interaction design principles should be adopted for
accessibility and ease of use?
How can security mechanisms, such as encryption and authentication, be
integrated to protect privacy and communication integrity?
What strategies can be implemented to ensure the system is scalable to
changes in the number of devices and their locations?
How can the offline capabilities of the mesh network communication system be
optimized to provide reliable data synchronization and storage?
What data management and synchronization techniques can be employed for
consistent and seamless communication?
How can the system leverage local storage and processing to enable offline
messaging, file sharing, and collaboration?
1.4 Objective of the research
General Objective:
Design, develop, and evaluate an offline mesh network communication system that
can provide reliable, secure, and user-friendly communication capabilities for local
communities with limited or no internet access.
Specific Objectives:
Create a decentralized mesh network architecture enabling peer-to-peer
communication without relying on the internet.
Develop a user-friendly and secure interface for the offline mesh network
communication system.
Enhance the offline capabilities of the mesh network system to enable reliable data
synchronization and storage.
Evaluate the performance, usability, and impact of the offline mesh network
communication system through user testing and field deployments.
2
Advancing mesh networking and decentralized communication technologies
1.6 Scope of the Study:
Mesh network architecture and protocols
User interface and interaction design
Offline communication and data management capabilities
Performance evaluation and user impact assessment
1.7 Limitations of the Study:
Geographic scope
Hardware constraints
Connectivity challenges
User adoption and behavioral factors
CHAPTER TWO
2.1. Introduction to Mesh Networking
2.1.1. Definition and Characteristics of Mesh Networks
Mesh networks are a decentralized network architecture where individual devices
(nodes) can communicate directly with each other without relying on a central
coordinator or infrastructure.
Key characteristics include:
Decentralized architecture with no central server or access point
Dynamic routing protocols to adapt to changes in network topology
Resilience and redundancy through interconnected paths
Scalability by adding more nodes
Efficient resource utilization across the distributed nodes
Evolution of Mesh Networking:
Roots dating back to 1970s-80s with early work on packet radio and ad-hoc
networking
3
Key milestones include the WINS project in the late 1990s and community initiatives
like Freifunk in the 2000s
Standards like IEEE 802.11s for Wi-Fi Mesh and Bluetooth Mesh further advanced
mesh networking capabilities
Rise of LPWAN technologies like LoRaWAN enabled large-scale, low-power mesh
networks
Widespread adoption for diverse use cases, driven by demand for decentralized,
resilient communication
2.2. Mesh Network Protocols and Technologies
2.2.1. Wi-Fi Mesh Networks
4
Potential performance trade-offs with flooding-based routing
Ongoing standardization and adoption
2.2.3. LoRaWAN Mesh Networks
Leverages LoRaWAN low-power, wide-area networking (LPWAN) technology
Long-range communication, up to several kilometers
Low-power operation for battery-powered devices
Mesh topology with LoRaWAN-enabled devices as mesh nodes
Various routing protocols and techniques for reliable message delivery
Scalable to support large-scale deployments
Advantages over Wi-Fi and Bluetooth Mesh:
Longer communication range
Higher signal penetration
Lower power consumption
Limitations:
Lower data throughput
Ongoing standardization and adoption
Regulatory constraints on LoRaWAN operation
5
Decentralized Data Processing: Enables distributed data processing closer to the
source.
Resilient and Fault-Tolerant Networks: Network reliability improved by lack of single
points of failure.
Offline Functionality: Devices can continue to operate and collaborate when
disconnected.
Scalability and Flexibility: P2P networks can scale more easily than client-server
architectures.
Reduced Bandwidth and Costs: Direct device-to-device communication reduces data
transmission.
Challenges:
1. Security and Trust Management: Maintaining secure communication and trust in
decentralized networks.
2. Device Discovery and Coordination: Mechanisms for device discovery and
coordination are complex.
3. Heterogeneity and Interoperability: Ensuring seamless interoperability between
diverse devices.
4. Routing and Forwarding: Implementing efficient routing protocols in decentralized
networks.
2.4. Security and Privacy in Mesh Networks
2.4.1. Authentication and Authorization
Device Authentication: Strong protocols like certificates or pre-shared keys.
User Authentication: Authentication for human interaction and control.
Role-Based Access Control: Fine-grained permissions and privileges for devices and
users.
Secure Key Management: Crucial to prevent unauthorized access.
2.4.2. Encryption and Data Protection
End-to-End Encryption: Protecting data confidentiality during transmission.
Secure Data Storage: Encrypting local data at rest on mesh nodes.
Secure Firmware Updates: Ensuring integrity and authenticity of updates.
Data Integrity and Non-Repudiation: Cryptographic techniques like digital signatures.
6
Secure Network Management: Authenticated processes for node addition/removal.
Intrusion Detection and Response: Identifying and mitigating security threats.
Tamper-Resistant Hardware: Using trusted platforms to enhance node security.
Secure Logging and Auditing: Maintaining audit trails for accountability.
7
Facilitating cross-network connectivity
2.6.3. User Adoption and Usability
Increasing user awareness and understanding
Designing user-friendly interfaces
Developing a rich ecosystem of applications and services
Establishing incentive structures
2.7. Related Research and Existing Solutions
2.7.1. Academic Research and Experiments
Routing and topology optimization
Resource-constrained devices
Decentralized applications
Testbeds and experimental deployments
2.7.2. Community-driven Mesh Network Projects
Guifi.net, FunkFeuer, Althea, Freifunk
2.7.3. Commercial and Enterprise-level Mesh Network Solutions
Ubiquiti Networks, Meraki (Cisco), OpenMesh, goTenn
8
Integration with Emerging Technologies: Exploring synergies between offline
mesh networks and technologies like edge computing, blockchain, and IoT could lead
to innovative applications.
2.8.2 Potential Contributions of this Study
This research aims to address gaps and explore new opportunities:
Develop advanced routing and optimization algorithms to enhance scalability and
performance.
Investigate techniques for seamless interoperability between heterogeneous mesh
technologies.
Design user-friendly interfaces and develop an ecosystem of applications to drive
adoption.
Propose novel incentive structures and sustainability models for long-term viability.
Explore integration of offline mesh networks with emerging technologies to unlock
new use cases.
By addressing these gaps, this study aims to contribute to the advancement of offline mesh
network technologies and facilitate their widespread adoption.
CHAPTER THREE:
METHODOLOGY
9
The target sample size will be determined based on a power analysis to ensure statistical
significance, as well as practical considerations such as resource constraints and the
availability of participants.
Mesh Network Protocol Design: The mesh networking protocol will be designed
based on a review of existing protocols, such as Wireless Mesh Network (WMN),
Mobile Ad-hoc Network (MANET), and Delay-Tolerant Network (DTN) protocols.
Key design considerations will include peer-to-peer communication, dynamic routing,
and self-organization.
Prototype Development: A prototype of the offline mesh network communication
system will be developed using open-source networking libraries, such as libp2p, and
web development frameworks, such as React and Node.js. The prototype will include
the core functionality of peer-to-peer messaging, file sharing, and synchronization.
User Interface Design: The user interface for the web application will be designed
using user-centered design principles. This will involve conducting user interviews,
creating low-fidelity prototypes, and iteratively refining the design based on user
feedback.
3.4 Data Collection and Evaluation
Usability Testing: Usability testing will be conducted with representative users to
assess the effectiveness, efficiency, and satisfaction of the system's user interface and
overall user experience. Quantitative metrics, such as task completion rates and user
satisfaction scores, as well as qualitative feedback, will be collected.
Performance Evaluation: The system's performance, in terms of network
throughput, latency, and scalability, will be evaluated through a series of controlled
experiments. These experiments will simulate different network conditions, such as
varying the number of devices, device mobility, and network topology.
Field Trials: The system will be deployed in selected local communities to gather
real-world feedback and evaluate its performance in actual usage scenarios.
Qualitative data, such as user observations and interviews, will be collected to
understand the system's impact and identify areas for improvement.
Data Analysis
Qualitative Analysis: Qualitative data from user interviews, usability testing, and
field trials will be analyzed using thematic analysis to identify key user pain points,
requirements, and overall experiences with the system.
Quantitative Analysis: Quantitative data from performance evaluations and usability
testing will be analyzed using statistical methods to assess the system's technical and
10
user-centric performance metrics. This will include measures such as network
throughput, latency, task completion rates, and user satisfaction scores.
Iterative Refinement: The findings from the data analysis will be used to iteratively
refine the system design, user interface, and underlying protocols to address identified
issues and improve the overall effectiveness of the offline mesh network
communication system.
3.5 Ethical Considerations
The study will adhere to the following ethical principles:
Informed Consent: Participants will be provided with detailed information about the
study and will be required to give their informed consent before participating.
Confidentiality: All personal and sensitive information collected from participants
will be kept confidential and securely stored.
Minimization of Harm: The research activities will be designed to minimize any
potential risks or discomfort to the participants.
Limitations and Assumptions
The main limitations of this study include:
The availability and accessibility of participants in remote or underserved areas
The potential variability in the hardware and software capabilities of participants'
devices
The ability to accurately simulate real-world emergency or disaster scenarios during
testing
The key assumptions underlying this research are:
Participants will have a genuine need for an offline communication system and will
be motivated to participate in the development and testing process.
The chosen mesh networking protocol and associated software libraries will be
suitable for the project's requirements and can be effectively integrated into the final
system.
11
CHAPTER FOUR WORK PLAN
4.1 Literature Review and Protocol Design (1-5 day)
Conduct a comprehensive review of existing mesh networking protocols, such as WMN,
MANET, and DTN
Analyze the strengths, limitations, and design considerations of these protocols
Design the mesh networking protocol for the offline communication system, incorporating
key features like peer-to-peer communication, dynamic routing, and self-organization
Estimated resource requirements: 1 senior researcher (100% FTE), 1 research assistant (50%
FTE)
4.2 Prototype Development (day 6 - 2 weak)
Develop the initial prototype of the offline mesh network communication system using open-
source networking libraries (e.g., libp2p) and web development frameworks (e.g., React,
Node.js)
Implement the core functionalities, including peer-to-peer messaging, file sharing, and
synchronization
Estimated resource requirements: 2 senior software engineers (100% FTE), 2 junior software
engineers (100% FTE)
4.3 Usability Testing (ewak 2 - weak 3)
Recruit representative users for usability testing sessions
Evaluate the effectiveness, efficiency, and satisfaction of the system's user interface and
overall user experience
Collect quantitative metrics (e.g., task completion rates, user satisfaction scores) and
qualitative feedback
Analyze the usability testing results and incorporate findings into the system design
Estimated resource requirements: 1 usability researcher (100% FTE), 10 test participants
12
4.5 Field Trials (weak 4 - weak 5)
Deploy the system in selected local communities with limited internet access
Gather real-world feedback and evaluate the system's performance in actual usage scenarios
Collect qualitative data through user observations and interviews
Analyze the field trial results and incorporate findings into the system design
Estimated resource requirements: 2 researchers (100% FTE), 20 field trial participants
4.6 Data Analysis and Iterative Refinement (weak 5 - weak 6)
Analyze the qualitative data from user interviews, usability testing, and field trials using
thematic analysis
Analyze the quantitative data from performance evaluations and usability testing using
statistical methods
Identify key findings, user pain points, and areas for improvement
Iteratively refine the system design, user interface, and underlying protocols based on the
analysis
Estimated resource requirements: 1 data analyst (100% FTE), 1 senior researcher (50% FTE)
4.7 Project Timeline
The overall project timeline is estimated to be 6 weak, with the key activities and milestones
as outlined above.
4.8 Resource Requirements
The total resource requirements for this project are estimated to be:
5 senior researchers/engineers (100% FTE)
3 junior researchers/engineers (100% FTE)
1 user experience designer (100% FTE)
1 graphic designer (50% FTE)
13
Conclusion
Offline mesh networks show promise in providing resilient, decentralized internet access.
While research has made progress, challenges remain in scalability, interoperability, user
experience, and sustainability. This study seeks to address these gaps and explore synergies
with emerging technologies, to enable broader adoption and impact of offline mesh networks.
14
References
[1] FON. http://en.fon.com/
[2] E. C. Efstathiou, P. A. Frangoudis and G. C. Polyzos. Stimulating Participation in
Wireless Community Networks. In Proceedings of IEEE INFOCOM 2006, Spain, 2006.
[3] N. Negroponte. Being Wireless. In Wired Magazine, Vol. 10, No. 10, 2002.
[4] Microsoft Research. Self-Organizing Neighborhood Wireless Mesh Networks.
http://research.microsoft.com/mesh/
[5] A. Quan-Haase and B. Wellman. How does the Internet Affect Social Capital. In Social
Capital and Information Technology, edited by M. Huysman and V. Wulf. Cambridge,
MA: MIT Press, pp. 113-32, 2004.
[6] S. Frattasi, H. Fathi, A. Gimmler, F.H.P. Fitzek and R. Prasad. Designing Socially Robust
15