- FAQs
- FAQs: mim OE Device Connectivity
FAQs: mim OE Device Connectivity
Is there a need for at least one device to be connected to the internet to create the mesh network? Or will it work even if no devices are connected to the internet?
Is there a need for at least one device to be connected to the internet to create the mesh network? Or will it work even if no devices are connected to the internet?
The user installs the app using the platform-appropriate app store (e.g. Google Play Store, iOS App Store).
The user registers with the app (meaning that mim OE will register the node ID under a specific user’s account ID).
mim OE receives a valid token from our back-end services. The token has expiration time depends on the scope of service which could be varied from 24 hours to a couple of days or months.
From this point on, mim OE doesn’t need the internet to be available:
mim OE uses the valid token to provide all functionality.
Devices on the same Wi-Fi network can discover each other using mim OE.
mimik mim OE container manager can instantiate any number of required microservices and use mimik services.
Microservices can communicate among each other, exchanging data.
Does mim OE have a dependency on a SaaS in the cloud? What are the deployment options for mimik’s backend?
Our product is deployed on AWS with multi-region configuration and it uses AWS Load balancer and auto scaling features. Other than that, all mimik components are NodeJS and deployed using Ansible, which let us minimize the effort required to deploy on AWS. All deployments are done via Ansible, which can also be used for on-premise deployment with some modifications in Ansible’s script.
In the current version of mim OE do you have enabling P2P communication using the TCP/UDP hole punching technique or something similar (ex: used by bittorrents, VoIP, etc...) implemented?
We are not using UDP or TCP hole punching as the primary P2P communication due to inconsistency in NAT traversal.
We use UDP multicast for local supernode discovery. For bootstrap registration and other communication, we use HTTPS; for tunneling to BEPs we use Secure WebSocket (WSS) for inbound communication (BEP TO NODE) and HTTPS for outbound communication (NODE TO BEP). In the future, we may consider UDP/TCP hole punching as a secondary mechanism.