Technical Manual for the Ambient Invisible Intelligence Mesh (AIIM) Network

1. Introduction

The Ambient Invisible Intelligence Mesh (AIIM) Network represents a cutting-edge distributed system meticulously designed to address the evolving demands of advanced cyber observability and autonomous threat detection in modern network environments. Built atop Ubuntu Server 24.04 Pro, this sophisticated 13-node mesh network employs a fully connected topology inspired by the geometric elegance of Metatron's Cube. By integrating Docker containers for service isolation, LiFi technology for high-speed internal communication, and WireGuard VPNs for secure external connectivity, the AIIM Network delivers a robust and innovative solution. This technical manual provides an exhaustive guide for network administrators and IT professionals, detailing the steps required to set up, configure, operate, and maintain the AIIM Network, ensuring its optimal performance, scalability, and security as of April 2, 2025.

1.1 Purpose

The primary purpose of the AIIM Network is to establish a resilient platform capable of continuously monitoring and analyzing network traffic, detecting potential threats in real-time, and maintaining secure, encrypted communication channels across its distributed nodes. This network leverages state-of-the-art technologies such as LiFi—a light-based communication protocol—and AI-driven anomaly detection powered by frameworks like TensorFlow and PyTorch. It aims to provide a pioneering solution for cybersecurity challenges, offering unparalleled observability and rapid response capabilities to safeguard sensitive data and infrastructure in an increasingly interconnected world.

1.2 Key Features

1.3 Audience

This manual targets network administrators, cybersecurity professionals, and IT specialists with a foundational understanding of Linux-based systems, containerization technologies, and network security principles. Readers are expected to possess working knowledge of Ubuntu Server administration, Docker container management, and basic networking concepts such as IP addressing, routing, and VPN configuration. Familiarity with command-line interfaces (CLI) and system troubleshooting is also assumed to fully leverage the detailed instructions provided herein.

1.4 Scope and Context

Developed as a proof-of-concept for advanced cyber observability, the AIIM Network combines theoretical graph theory (K₁₃ topology) with practical implementations of emerging technologies like LiFi and containerized microservices. This manual covers the complete lifecycle of the network—from hardware preparation and software installation to operational monitoring and security hardening—while providing context for its deployment in real-world scenarios such as enterprise security, research labs, or edge computing environments. The removal of prior claims about being the "world's smallest mesh" ensures a focus on technical merit rather than unverifiable assertions, aligning with professional documentation standards.


2. Network Architecture

The AIIM Network is architecturally designed as a 13-node mesh network adhering to a fully connected graph structure, denoted as K₁₃ in graph theory nomenclature. This configuration ensures that every node maintains a direct connection to all other nodes, maximizing redundancy and resilience against failures or attacks—a critical feature for a system tasked with continuous observability and threat detection.

2.1 Nodes and Roles

  1. pfSense (Node 0)
    Role: Acts as the central firewall and VPN gateway, serving as the primary entry and exit point for network traffic.
    Services: Manages inbound and outbound traffic, provides DHCP for IP assignment within the LAN, and hosts a WireGuard VPN server for secure external connectivity.
    IP Address: 192.168.1.1/24 (LAN), dynamically assigned WAN IP.
  2. IONOS-VPS1 (Node 1)
    Role: Functions as a cloud-based external gateway, bridging the internal mesh to external networks.
    Services: Runs an Nginx reverse proxy for traffic routing, a WireGuard client for VPN connectivity, a Tor exit node for anonymized external traffic, and Suricata for intrusion detection.
    IP Address: 65.38.96.106 (public).
  3. IONOS-VPS2 (Node 2)
    Role: Operates as a cloud-based honeypot to attract and analyze malicious activities.
    Services: Hosts Cowrie for SSH/Telnet emulation, a WireGuard client for secure tunneling, and a Tor relay to support anonymized routing.
    IP Address: 74.208.11.214 (public).
  4. ASUS-Aspire (Node 3)
    Role: Serves as an internal web and DNS server, supporting network services and name resolution.
    Services: Runs Nginx for web hosting and Bind9 for DNS resolution.
    IP Address: 10.0.0.50/24.
  5. HPMini (Node 4)
    Role: Acts as a sensor hub, integrating physical monitoring capabilities into the network.
    Services: Employs HAProxy for load balancing and MotionEye for managing camera feeds.
    IP Address: 10.0.0.20/24.
  6. Proxmox-Server (Node 5)
    Role: Functions as the virtualization host, managing a cluster of virtual machines (VMs) and containers.
    Services: Utilizes Docker Swarm for orchestration of VMs and containers across the network.
    IP Address: 10.0.0.171/24.
  7. Legion-Laptop (Node 6)
    Role: Dedicated to AI inference, processing data for anomaly detection and threat analysis.
    Services: Runs TensorFlow for machine learning tasks and an SSH server for remote access.
    IP Address: 192.168.1.7.
  8. Proxmox-VM2 to Proxmox-VM7 (Nodes 7-12)
    Roles: Specialized service nodes hosted on the Proxmox-Server:
    - Node 7 (Proxmox-VM2): Analytics with Elasticsearch (10.0.0.172/24).
    - Node 8 (Proxmox-VM3): Backup with BorgBackup (10.0.0.173/24).
    - Node 9 (Proxmox-VM4): Staging environment with Nginx (10.0.0.174/24).
    - Node 10 (Proxmox-VM5): Monitoring with Prometheus (10.0.0.175/24).
    - Node 11 (Proxmox-VM6): Database management with PostgreSQL (10.0.0.176/24).
    - Node 12 (Proxmox-VM7): Load balancing with HAProxy (10.0.0.177/24).

2.2 Connectivity

The AIIM Network employs a dual-tier connectivity model to balance internal efficiency and external security:

2.3 Topology Diagram

*(Note: In a production environment, include an SVG or PNG diagram here illustrating the 13-node topology. Green dashed lines represent LiFi connections; orange solid lines indicate WireGuard VPN links. A legend should explain line styles, colors, and node roles.)*

2.4 Communication Protocols

2.5 Resilience and Fault Tolerance

The K₁₃ topology underpins the network’s exceptional resilience:

These metrics guarantee that the AIIM Network remains functional during disruptions, making it ideal for mission-critical applications.

2.6 Design Rationale

Inspired by Metatron's Cube, the fully connected K₁₃ topology maximizes communication pathways, reducing latency and enhancing fault tolerance. LiFi offers a forward-thinking approach to LAN connectivity by prioritizing security and bandwidth efficiency, while WireGuard provides a simple, high-performance solution for external VPN needs.


3. Hardware and Software Requirements

3.1 Hardware Requirements

Deploying the AIIM Network necessitates a precise combination of hardware components:

3.2 Software Requirements

The software stack is selected to support the network’s distributed architecture:

3.3 Prerequisites

Prior to deployment, ensure stable power supplies, reliable internet connectivity, and proper physical arrangement of devices to meet LiFi LOS requirements.


4. Installation and Configuration

4.1 Preparing the Hardware

Assemble each Raspberry Pi 5 with its power supply, case, heat sink, and attach the LiFi transceiver as per the manufacturer’s guidelines. Provision the VPS instances via the IONOS dashboard and set up the ASUS Server, Desktop, Mini PC, and Legion Laptop with appropriate network connections.

4.2 Installing Ubuntu Server

Download the Ubuntu Server 24.04 Pro ISO from ubuntu.com. Create a bootable USB using Rufus or Etcher, then boot the device and follow the installation prompts. For VPS instances, select Ubuntu Server during provisioning.

4.3 Configuring Network Interfaces

For LiFi connectivity, install the required drivers and assign static IP addresses in the 10.0.0.0/24 subnet via the `/etc/netplan/01-netcfg.yaml` file. Apply changes using sudo netplan apply. Configure pfSense with the LAN interface on 10.0.0.1/24 and set the WAN interface accordingly.

4.4 Setting Up Docker and Swarm

sudo apt update
sudo apt install -y docker.io
sudo systemctl enable docker
sudo systemctl start docker

# On Node 5 (Proxmox-Server)
docker swarm init --advertise-addr 10.0.0.171

# On other nodes, join the swarm using the token:
docker swarm join --token <token> 10.0.0.171:2377
      

4.5 Configuring WireGuard VPN

On Node 0 (pfSense), install the WireGuard package, generate keys, and configure the WireGuard interface. For Nodes 1 and 2, install WireGuard and create appropriate client configuration files.

4.6 Deploying Containers

Use Docker commands to deploy containers for each service. For example, deploy pfSense on Node 0, Nginx on Node 1, and TensorFlow on Node 6. Adjust ports, volumes, and environment variables as required.

4.7 Setting Up LiFi Transceivers

Follow the pureLiFi guidelines to pair each transceiver. Test connectivity using ping to verify communication within the 10.0.0.x subnet.

4.8 Configuring MotionEye

sudo apt install -y motion motioneye
sudo systemctl enable motioneye
sudo systemctl start motioneye
      

5. Operation and Maintenance

5.1 Monitoring

Deploy Prometheus on Node 10:

docker run -d --name prometheus -p 9090:9090 prom/prometheus
      

Configure Prometheus to scrape metrics from all nodes. Integrate Grafana for visualization.

5.2 Updating Software

sudo apt update
sudo apt upgrade -y
docker pull <image>
docker rm -f <container>
docker run -d <image>
      

5.3 Backup and Recovery

borg init -e repokey /backup
borg create /backup::daily-{now} /data
      

5.4 Log Management

Deploy Elasticsearch on Node 7 for centralized log analysis and set up retention policies.


6. Security Considerations

6.1 Firewall Configuration

Use pfSense to restrict traffic to essential ports (e.g., 22, 80, 443, 51820). Implement traffic shaping if necessary.

6.2 Encryption and Key Management

Enforce strong ciphers for both LiFi and WireGuard. Rotate VPN keys every 90 days.

6.3 Intrusion Detection and Honeypots

Configure Suricata for real-time IDS and deploy Cowrie on Node 2 to simulate vulnerable services and capture malicious activity.

6.4 AI-Driven Anomaly Detection

Train AI models using TensorFlow and PyTorch with historical network data and deploy on Node 6 to detect anomalies in real-time.


7. Troubleshooting

7.1 Node Connectivity Issues

Check: LiFi alignment, static IP configurations, and netplan settings.
Fix: Re-align transceivers, update IP settings in /etc/netplan, and apply with sudo netplan apply.

7.2 VPN Failures

Check: WireGuard key validity and firewall rules on pfSense.
Fix: Regenerate keys if necessary and review pfSense WireGuard configuration.

7.3 Container Failures

Check: Container logs using docker logs <container> and resource usage.
Fix: Increase resource limits or redeploy containers.


8. Appendices

Appendix A: Sample WireGuard Config

[Interface]
PrivateKey = <private_key>
Address = 10.0.0.1/24
ListenPort = 51820

[Peer]
PublicKey = <peer_public_key>
AllowedIPs = 10.0.0.2/32
Endpoint = 65.38.96.106:51820
      

Appendix B: Docker Compose for Node 0

version: '3'
services:
  pfsense:
    image: pfsense/pfsense
    network_mode: host
    ports:
      - "80:80"
      - "443:443"
    volumes:
      - ./pfsense_config:/config
      

Key Points


9. Additional Network Principles and Enhancements

9.1 Introduction to Missing Network Principles

The Ambient Invisible Intelligence Mesh (AIIM) Network is a pioneering 13-node system designed for advanced cyber observability and threat detection. While the foundational aspects of architecture, installation, and basic security are covered, several critical network design principles remain underexplored. These include hierarchical design, modularity, Quality of Service (QoS), scalability planning, network segmentation, comprehensive performance monitoring, redundancy and failover, and adherence to industry standards.

In the following sections, we delve deep into these principles to provide network administrators with an exhaustive guide. This advanced documentation not only enhances the overall technical manual but also serves as a reference for implementing best practices in high-performance, secure, and scalable network infrastructures.

9.2 Hierarchical Design and Modularity

9.2.1 Hierarchical Network Design

Hierarchical network design is a proven strategy in managing large-scale networks. It divides the network into layers—core, distribution, and access—each with distinct responsibilities. For the AIIM Network:

Formalizing these layers minimizes broadcast domains and simplifies troubleshooting. In practice, this means that adding a new node in the access layer would not require reconfiguring every connection in the network—only the distribution layer would need to be updated.

9.2.2 Modularity

Modularity involves organizing the network into discrete functional blocks, such as security, data, and AI modules. This approach isolates different services, making it easier to manage and upgrade parts of the network without affecting the whole system. For example, grouping all security-related functions (firewall, IDS, honeypot) into one module allows for centralized updates and streamlined monitoring.

9.3 Quality of Service (QoS)

QoS is essential for ensuring that critical applications, such as real-time AI inference and network monitoring, receive priority over less critical traffic. By marking traffic with DSCP values and configuring bandwidth allocation on pfSense, administrators can control latency, jitter, and packet loss. In the AIIM Network:

9.4 Scalability and Load Balancing

The AIIM Network's fully connected K₁₃ topology is ideal for a small-scale deployment; however, future expansion requires a well-defined scalability plan. This plan should include:

9.5 Network Segmentation and Enhanced Security

Segmentation divides the network into isolated zones, limiting the spread of potential breaches. In the AIIM Network:

A Zero Trust approach can further secure the network by verifying every access request and continuously monitoring all traffic.

9.6 Performance Monitoring and Optimization

Continuous performance monitoring is critical for maintaining an efficient network. Beyond using Prometheus for basic metrics, administrators should track:

Optimization strategies include fine-tuning kernel parameters via sysctl, optimizing disk I/O with SSDs and RAID configurations, and adjusting network buffers. Regular performance benchmarks using tools such as Phoronix Test Suite provide insights into the impact of configuration changes.

9.7 Redundancy and Failover Mechanisms

Despite the high connectivity of the K₁₃ topology, physical redundancy is paramount. This involves:

9.8 Compliance with Industry Standards

Ensuring compliance with regulations such as GDPR and ISO 27001 is critical. The AIIM Network should incorporate:

9.9 Future Directions and Emerging Trends

The field of network design is rapidly evolving with the integration of AI, edge computing, and intent-based networking. Future enhancements to the AIIM Network may include:

Staying ahead of these trends will require ongoing research, training, and adaptation. The AIIM Network manual should be viewed as a living document—continuously updated to reflect the latest technological advancements and best practices.

9.10 Conclusion

By integrating hierarchical design, modularity, Quality of Service, scalability planning, network segmentation, comprehensive performance monitoring, redundancy, and compliance measures, the AIIM Network is poised to become a benchmark in secure, high-performance distributed systems. This extended documentation not only fills in the gaps of the initial manual but also provides a forward-looking perspective essential for operating in an ever-changing technological landscape.

With these enhancements, network administrators and IT professionals are equipped with an exhaustive guide that empowers them to deploy, manage, and continuously improve the AIIM Network. As new challenges and opportunities arise, the principles and strategies outlined herein will serve as a robust foundation for future innovation and operational excellence.