OPSEC Mesh WirelessTM networks are the proven leader in delivering truly ubiquitous, metro scale Wi-Fi mesh network systems. Ours are the fastest, lowest cost and simplest wireless broadband solutions currently on the market.


Our predictive wireless routing protocol allows public safety agencies, municipalities, and service providers to quickly and easily deliver city-wide fixed and mobile multi-megabit connectivity for IP based voice, video and data applications implemented over a Wireless LAN. Predictive wireless routing protocol is the key to top performance, lowest costs, and simplest installation and expansion.

This type of Internet infrastructure is decentralized, very reliable and resilient, as each node needs only to transmit as far as the next node. OPSEC Mesh Wireless nodes using embedded predictive wireless routing protocols, create a self-organising and self healing wireless mesh that select the most optimum data path to the wired network. Wireless nodes act as repeaters to transmit data from nearby nodes to peers that are too far away to reach, resulting in a network that can span large distances, especially over rough or difficult terrain.

OPSEC Mesh Wireless networks are also extremely reliable, as each node is connected to several other nodes. If one node drops out of the network, due to hardware failure or any other reason, its neighbours simply find another route. Extra capacity can be installed by simply adding more nodes. OPSEC Mesh Wireless networks may involve either fixed or mobile devices.


The principle of OPSEC Mesh Wireless networks is similar to the way packets of data travel around the wired Internet. Data will hop from one device to another until it reaches a given destination.

Dynamic routing capabilities included in each device allow this to happen. To implement such dynamic routing capabilities, each device needs to communicate its routing information to every device it connects with, in “real time”. Each device then determines what to do with the data it receives – either pass it on to the next device or keep it. The routing algorithm used should attempt to always ensure that the data takes the most appropriate (fastest) route to its destination.

The choice of radio technology for wireless mesh networks is crucial. In a traditional wireless network where laptops connect to a single access point, each laptop has to share a fixed pool of bandwidth. With OPSEC Mesh Wireless technology and adaptive radio, devices in a mesh network will only connect with other devices that are in a set range. The advantage is that, like a natural load balancing system, the more devices the more bandwidth becomes available, provided that the number of hops in the average communications path is kept low.

To prevent increased hop count from cancelling out the advantages of multiple transceivers, one common type of architecture for wireless mesh networks includes multiple fixed base stations with "cut through" high-bandwidth terrestrial links that will provide gateways to services, wired parts of the internet and other fixed base stations. The "cut through" bandwidth of the base station infrastructure must be substantial for the network to operate effectively. However, one feature of OPSEC Mesh Wireless networks is that an operator need only deploy a minimal base station infrastructure, and allow the users themselves to extend the network.


The virtual network infrastructure allows many different user communities using OPSEC Mesh Wireless networks to each have their own private network, offering its own address space, classes of service and security settings running over a single mesh infrastructure.

Mesh Wireless

For example, in an OPSEC Mesh Wireless network, various departments, such as military, police, ambulance, fire, public works, utilities and government could each have their own network that can be administered separately from the others with different access and security protocols. The network could also be opened for public access for use by different groups of users such as municipal departments, mobile enterprises, small businesses, residential customers and nomadic users. Each user group would be assured that their data would be isolated from other user groups.

Running multiple user groups on the OPSEC Mesh Wireless infrastructure maximises return on investment by leveraging the infrastructure investment and fixed costs across the highest possible number of users.


The OPSEC Mesh Wireless multi-layer security model combines time-tested and proven internet security techniques with the inherent intelligence of OPSEC Mesh Wireless routers to create a robust, multi-layered security framework that uses both security features of OPSEC Mesh Wireless routers plus best of breed third party solutions. Predictive Wireless Routing Protocol is encrypted using AES, while wireless traffic is encrypted via WEP or WPA. Inter-router data traffic can also be encrypted using AES. MAC address filtering provides an additonal layer of security. A VPN can be established across the network. For maximum privacy, VPN traffic filters ensure that only traffic destined for specific VPN concentrators can use the network.

Camera City Tower Traffic Lights


The solutions that we can build are as diverse as communications in difficult environments such as emergency situations, tunnels and oil rigs to battlefield surveillance and high speed mobile video applications on board public transport or real time racing car telemetry.

OPSEC can design and build a clients Network Operations Center (NOC) with OPSEC Mesh Wireless technology. The NOC brings together the engineering, programming and services to integrate the best characteristics of today's leading wireless microcell products into one system to be at the core or edge of your business requirements.


From an initial site survey, through detailed network design and integration, to final installation and testing, OPSEC Mesh Wireless offers a range of professional services to ensure a complete and successful Mesh network installation. Full project management is available to oversee all stages of the network deployment.