Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 5 Current »

Minimum hardware specification

Once OpenSync is running on a device (gateway or extender), you can expect memory and CPU usage as stated in the table below.

The expected memory footprint does not include third-party services and plugins. To include these in your memory consumption estimations, please contact info@opensync.io.

Hardware

Minimal requirement

Flash

OpenSync: 5 MB
Dependencies: 6 MB

RAM

OpenSync: 75 MBytes
Dependencies: 9 MBytes

CPU

Single core: 750 MHz
CPU usage < 5 %

Temporary file system

OpenSync requires a minimum of 16 MB storage for the tmpfs (temporary file system).

Persistent storage

There should be a minimum of 7 MB persist storage for features like reboot reasons, WAN configuration. For details refer to Requirements | Persistent Storage

Dependent libraries

OpenSync is optimized for Linux operating systems with kernel version 3.3 or higher. In addition, OpenSync requires minimal the following libraries:

Purpose

Library

Recommended Version

toolchain

[libc.so.0]
[libdl.so.0]
[libgcc_s.so.1]
[libpthread.so.0]
[librt.so.0]
[libm.so.0]

 

system

[libssl.so.1.0.0]
[libcares.so.2]
[libz.so.1.2.8]
[libncurses.so.5.9]

openssl-1.0.2k
c-ares-1.10.0
zlib-1.2.8
ncurses-5.9

applications

[libjansson.so.4
[libmosquitto.so.1]
[libwebsockets.so.16
[libprotobuf-c.so.1]
[libprotobuf.so]
[libpcap.so.1.3.0]
[libev.so.4]
[libmxml.so.1.5]
[libmnl.so.0.1.0]
[libcurl.so.4.3.0]

jansson-2.7
mosquitto-1.6.9
libwebsockets 4.0.0
protobuf-c-1.3.3
protobuf-3.14.0
libpcap-1.5.3
libev-4.24
libmxml-2.8
libmnl-1.0.3
curl-7.40.0

openvswitch

[libncurses]
[libreadline]
[libovsdb.so.1.0.0] [libopenvswitch.so.1.0.0]

ncurses-6.1
readline-8.0
openvswitch-2.8.7

Device identification parameters

To correctly identify and manage the connected devices, OpenSync requires basic device information parameters.

Device identification parameters (stored in AWLAN_Node table):

  • ID - must be unique per node

  • model name - Defines the node model

    • Case sensitive

    • Should not have leading or trailing spaces

    • Must be unique in the world

    • Match regex pattern: ^[A-Za-z0-9_-]*

  • firmware version - details below

Firmware version format

To ensure node compability with the SDN controller, the firmware package version must be named using a specific format. The firmware package version starts with at least two numerals, split by a dot. The expected format is:

  • major.minor[.revision][.patch][-build][-githash][-profile]

Example: 1.2.4-8-ga46f46c-dev

Component

Mandatory / Optional

Value type

Major

Mandatory

Integer

Minor

Mandatory

Integer

Revision

Optional

Integer

Patch

Optional

Integer

Build number

Optional

Integer

Git hash

Optional

String

Firmware profile (development or production)

Optional

String

Secure cloud connection

One of the top OpenSync priorities is ensuring the highest level of data privacy by enforcing state-of-the-art security standards, such as client authentication and data encryption for all the nodes that connect to the OpenSync SDN contoller. These security mechanisms require node certificates and encryption keys. Connection is secure by using TLS 1.2 and two way SSL mutual authentication.

Details on certificate creating and storing are defined at integration time with each partner individually.

Firewall rules

OpenSync is a cloud-controlled and cloud-managed software. As such, OpenSync requires cloud connectivity. Firewall rules must allow the necessary cloud connection:

  • allow 443 port for OVSDB and MQTT connection to the SDN controller

Node reboot method

OpenSync requires the ability to enforce a safe full-node reboot and general OpenSync implementation is in OSP layer.

Remote upgrade support

To enable OpenSync updates, the connected nodes must support full firmware upgrades which we provide over generic tool called safeupdate. Images should be encrypted.

Details on upgrade implementation are defined at integration time with each partner individually.

Switching from native Linux to Open vSwitch (OVS)

OpenSync services take full advantage of the OVS networking features. The integrators should switch from native networking (such as native Linux bridge implementation) to the OVS networking (OVS bridges).

WAN information

OpenSync needs to be aware of WAN configuration and state.

LAN information

OpenSync must be aware of all clients connected to the LAN network. Information about the client devices and their basic configuration is mandatory.

Watchdog

OpenSync runs as embedded software and therefore requires a mechanism that detects potential malfunctions and automatically initiates the recovery procedure. One such mechanism is the Watchdog.

Currently OpenSync does not provide implementation and we suggest to use software or hardware-based watchdog. Hardware watchdog is recommended.

WiFi virtual access points (VAP)

There should be 8 VAP per radio available (1 STA + 7 AP’s) for OpenSync to use simultaneously. SDN controller will orchestrate them per customer needs in runtime.

Additional Requirements

Feature Group

Feature

Requirements Document

Configuration and Statistics

OVS, OVSDB

 

Basic Telemetry

 

Persistent Storage

 

Gateway Integration

Active or Passive mode

 

External DB Integration

 

Network Protocols

IPv4, IPv6

 

IPTV

IPTV Traffic Separation

 

WiFi Modes

11ax (WiFi 6)

 

WiFi6E

 

WiFi Mesh

Topology Management

 

GRE Backhaul

 

Multi-AP Backhaul (4addr)

 

WiFi Features

Multi-psk

 

Dynamic Frequency Selection (DFS)

 

Zero-wait DFS

 

DPP

 

HaaHs Public WiFi

 

Band and Client Steering

Also refer to FAQ | Band and Client Steering

Basic/Legacy, 11k/11v Steering

 

Advanced Features

 

WPS Support

WPS from App

 

Third Party Services

FSM Plugins

 

Small Business

Captive Portal

 

Rate Limiting

 

  • No labels