Documentation Center · NetAccel Wi-Fi + Bridge Edition
This documentation is intended for engineers, IT administrators, and collaborators interested in NetAccel’s internal architecture or planning to deploy NetAccel in teaching or research environments. It represents the “second layer” of our website—not end-user guides, but engineering documentation for maintainers and decision-makers.
Table of Contents
-
🌉 Network Architecture & Data Flow (Workhorse Tech Stack)
End-to-end path from client to the internet:br0bridging,dnsmasq, Pi-hole, Unbound, Clash, and the relationship between Beacon and Liaison stations. -
🔐 Security Design & Unattended Updates
Full-disk encryption (LUKS), unique device identity, two-phase configuration, and automated security updates with audit-friendly logging.
Core Design Principles
All engineering decisions in NetAccel revolve around three foundational principles:
- Clean Network Path — Minimize unnecessary intermediaries and DNS pollution.
- Verifiable Security — Full-disk encryption, unique device identity, and logs designed for auditing.
- Minimal Interaction — Maintainability without requiring constant human oversight.
If you only care about how to use it, please go directly to the
Quick Start Guide and Resource Center.
If you’re curious about why it’s built this way, this documentation is for you.