Preview

Optimize Link State Routing Protocol for mobile ad hoc networks

Good Essays
Open Document
Open Document
361 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Optimize Link State Routing Protocol for mobile ad hoc networks
The routing protocol is the key component of any mobile ad hoc network, this is the minimum requisite in order to enable communication within the network. We have developed OLSR, an optimized link state routing protocol which is based on MPR flooding. Since OLSR support the whole legacy of internet, it can carry many extensions, some of them specific to mobile ad hoc networking.
This protocol has been presented and successfully defended in the working group MANET of the Internet Engineering Task Force (IETF) and presently is an experimental RFC [3]. The protocol scales particularily well when the network density increases and provides optimal path in terms of hop number.

Another contribution of the project lies in the development of source code of the OLSR routing protocol. This included development of a daemon, able to run on real wireless networks, based on 802.11 ad hoc mode. This allowed to use, test, and evaluate ad-hoc networking in real life. Real world measurements were done on a testbed at INRIA, which enabled enhancements of the protocol, taking into account the instability of real radio links. Later, the project team deployed the OLSR protocol in a bigger network on another site, under partnership; performance was thoroughly evaluated: mobility (with different speeds) ; tests of the reactivity of the routing protocol with respect to topology changes ; good behavior of the protocol in a static configuration (neighborhood, no routing loops) ; analysis of available bandwidth depending on the number of hops, ... The code was also ported to industrial simulation environments (like OPNET), and allowing the test the performance of the OLSR protocol, with more stringent topology and networks (higher number of nodes, higher mobility, ...), and which was the subject of extensive study under those conditions.
The Optimized Link State Routing protocol was, in 2003, standardized by the IETF as RFC3626. Publication of OLSR as RFC lead to a large influx of

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 7

    • 410 Words
    • 2 Pages

    Note that the fact that the on-demand approach of the AODV protocol minimizes routing table information. AODV uses traditional routing tables as it is a reactive routing protocol. To determine whether routing information is up-to-date and to prevent routing loops sequence numbers are used. The maintenance of time-based states is a crucial feature of AODV which suggests that a routing entry that isn't recently used is expired. In case of route breakage, the neighbours are notified. The discovery of the route from source to destination relies on query and reply cycles and intermediate nodes store the route information within the type of route table entries along the…

    • 410 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    ITNE455-1204A-01 U3GP3

    • 5030 Words
    • 21 Pages

    Little, M. (1989, October). Goals and Functional Requirements for Inter-Autonomous System Routing: RFC 1126. Retrieved from http://tools.ietf.org/html/rfc1126…

    • 5030 Words
    • 21 Pages
    Powerful Essays
  • Best Essays

    Falk, M. (2004). “Fast and Secure Roaming in WLAN”, Department of Computer and Information Science.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    NT1210 Lad 5

    • 598 Words
    • 4 Pages

    The IEEE 802.1standard concerns with the standards and recommendations in the of architecture and internetworking of local area networks (LANs) and metropolitan area networks (MANs), security, network management, and protocol issues above the Data Link Layer.…

    • 598 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    It230 Unit 3 Assignment 1

    • 5629 Words
    • 23 Pages

    Vehicular Ad hoc Network (VANET), a subclass deriving from Mobile Ad Hoc networks (MANET), is a promising approach for future intelligent transportation system…

    • 5629 Words
    • 23 Pages
    Powerful Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With OSI (Open Systems Interconnection) was developed to help standardize networking. The OSI model has been an element of computer network design since the early 1980’s. With the OSI model it shows how the network protocols and equipment should communicate and work together as one. With the OSI as a standard with in ISO (International Standards Organization) todays current technology does not always conform to the standard of the ISO, but it…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Powerful Essays

    With admirable foresight, the Internet Engineering Task Force (IETF) initiated as early as in 1994, the design and development of a suite of protocols and standards now known as Internet Protocol Version 6 (IPv6), as a worthy tool to phase out and supplant IPv4 over the coming years. There is an explosion of sorts in the number and range of IP capable devices that are being released in the market and the usage of these by an increasingly tech savvy global population. The new protocol aims to effectively support the ever-expanding Internet usage and functionality, and also address security concerns.…

    • 981 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    IT245 PH3 DB1

    • 310 Words
    • 1 Page

    For phase 3 discussion board we are ask to describe and compare the Open Systems Interconnection (OSI) model with another network model. For this assignment I will use the Transmission Control Protocol / Internet Protocol (TCP/IP) model. These models divide the communication process of the network into smaller parts. This helps with design, development, and troubling shooting. The OSI model has 7 layers- 1) Physical, 2) Data Link, 3) Network, 4) Transport, 5) Session, 6) Presentation, 7) Application. The TCP/IP model has 4 layers.…

    • 310 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Palmer, M. & Sinclair R.B., (2003). Guide To Designing and Implementing Local and Wide Area Networks (2nd Edition). Thompson Learning, Inc.…

    • 1409 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Final Paper Introduction

    • 578 Words
    • 2 Pages

    First invented in the 1950s by the United State Military during the Cold War, the dynamics of the Internet have gone through a complete transformation. The World Wide Web combined with modern day technology including smart phones, tablet, and laptops, every corner in the globe is open for instant communication. Moreover, combine the ease of use with the…

    • 578 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Bs311 Unit 3 Essay

    • 3508 Words
    • 15 Pages

    Designing secure key distribution in an ad-hoc network might be an extremely hard task. Any reliance on a certificate of authority is not trivial at all, for the same reasons that reliance in any centralized authority is problematic. Additional problems include the increased packet sizes required by authentication extensions, unicast/multicast routing, Quality of Service support and power aware routing. Furthermore, due to the limited transmission range of wireless network interfaces, multiple hops may be needed to exchange data between nodes in the network (c.f.…

    • 3508 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    I would tell Fred to use the Peer-to-Peer architecture or the Client Server architecture both have pro’s and con’s. The reason that I would tell him to use the Peer-to-Peer architecture is in a peer to peer architecture, workstation on the network will be able to shares its files equally with the other buyers. Peer-to-peer networks should be installed in very small businesses, and since this is a small business, it should fit perfectly. They are inexpensive to set up , which is what Fred needs. A peer-to-peer network can support about ten clients and that should be plenty. The key thing to remember about peer-to-peer networking is that it shares files and printers as inexpensively as possible; y. Since Fred’s users are allowed to control access to the resources on their own computers. One thing that you have to be careful with…

    • 453 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Misra, S., Misra, S. C., & Woungang, I. (2010). Selected topics in communication networks and distributed systems. Singapore: World Scientific.…

    • 682 Words
    • 3 Pages
    Good Essays
  • Good Essays

    UNIT 5 ASSIGNMENT 1

    • 1135 Words
    • 4 Pages

    OSPF’s rules for different types of areas and LSAs can be conceptually more difficult to understand Some customers believe EIGRP is easier to implement, but both are feature-rich and scalable…

    • 1135 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Osi vs Tcp Ip Model

    • 767 Words
    • 4 Pages

    The Open Systems Interconnection (OSI) reference model created in the late seventies and used today consists of seven layers that include Application, Presentation, Session, Transport, Network, Data Link and Physical. The Application layer often dubbed Layer 7 is the most common layer to end users and can consist of applications such as Microsoft's Internet Explorer or other browser software. The Presentation layer provides a translation of application data to network format in order to be processed and is considered bidirectional. The Session layer is responsible for controlling communication between applications by establishing, managing and ending dialogs. The Transport layer is responsible for end to end error recovery and the complete transparent transfer of data between systems. The Network layer is where all switching and routing of data takes place. This layer is responsible for congestion control as presented in this week's discussion question and also provide packet prioritization. Finally we have the Data Link and Physical layers. The Data Link is where data packets are encoded into bits and is divided into two sublayers: Media Access Control (MAC) and Logical Link Control (LLC). The Physical layer is where hardware such as Network Interface Cards (NIC) and other protocols reside. Prior to OSI becoming a standard there was a dual effort in modeling and Institute of Electrical and Electronic Engineers (IEEE) was in its infancy. IEEE 802 resides in what is known as the Data Link and Physical layer of the OSI model.…

    • 767 Words
    • 4 Pages
    Powerful Essays