Preview

Optimize Link State Routing Protocol for mobile ad hoc networks

Good Essays
Open Document
Open Document
361 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Optimize Link State Routing Protocol for mobile ad hoc networks
The routing protocol is the key component of any mobile ad hoc network, this is the minimum requisite in order to enable communication within the network. We have developed OLSR, an optimized link state routing protocol which is based on MPR flooding. Since OLSR support the whole legacy of internet, it can carry many extensions, some of them specific to mobile ad hoc networking.
This protocol has been presented and successfully defended in the working group MANET of the Internet Engineering Task Force (IETF) and presently is an experimental RFC [3]. The protocol scales particularily well when the network density increases and provides optimal path in terms of hop number.

Another contribution of the project lies in the development of source code of the OLSR routing protocol. This included development of a daemon, able to run on real wireless networks, based on 802.11 ad hoc mode. This allowed to use, test, and evaluate ad-hoc networking in real life. Real world measurements were done on a testbed at INRIA, which enabled enhancements of the protocol, taking into account the instability of real radio links. Later, the project team deployed the OLSR protocol in a bigger network on another site, under partnership; performance was thoroughly evaluated: mobility (with different speeds) ; tests of the reactivity of the routing protocol with respect to topology changes ; good behavior of the protocol in a static configuration (neighborhood, no routing loops) ; analysis of available bandwidth depending on the number of hops, ... The code was also ported to industrial simulation environments (like OPNET), and allowing the test the performance of the OLSR protocol, with more stringent topology and networks (higher number of nodes, higher mobility, ...), and which was the subject of extensive study under those conditions.
The Optimized Link State Routing protocol was, in 2003, standardized by the IETF as RFC3626. Publication of OLSR as RFC lead to a large influx of

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 7

    • 410 Words
    • 2 Pages

    Note that the fact that the on-demand approach of the AODV protocol minimizes routing table information. AODV uses traditional routing tables as it is a reactive routing protocol. To determine whether routing information is up-to-date and to prevent routing loops sequence numbers are used. The maintenance of time-based states is a crucial feature of AODV which suggests that a routing entry that isn't recently used is expired. In case of route breakage, the neighbours are notified. The discovery of the route from source to destination relies on query and reply cycles and intermediate nodes store the route information within the type of route table entries along the…

    • 410 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Falk, M. (2004). “Fast and Secure Roaming in WLAN”, Department of Computer and Information Science.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    NT1210 Lad 5

    • 598 Words
    • 4 Pages

    The IEEE 802.1standard concerns with the standards and recommendations in the of architecture and internetworking of local area networks (LANs) and metropolitan area networks (MANs), security, network management, and protocol issues above the Data Link Layer.…

    • 598 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    It230 Unit 3 Assignment 1

    • 5629 Words
    • 23 Pages

    General assessment of the selected routing protocol identify its functionality and how an algorithm should be developed to the specific routing protocol.…

    • 5629 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    ITNE455-1204A-01 U3GP3

    • 5030 Words
    • 21 Pages

    Little, M. (1989, October). Goals and Functional Requirements for Inter-Autonomous System Routing: RFC 1126. Retrieved from http://tools.ietf.org/html/rfc1126…

    • 5030 Words
    • 21 Pages
    Powerful Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With OSI (Open Systems Interconnection) was developed to help standardize networking. The OSI model has been an element of computer network design since the early 1980’s. With the OSI model it shows how the network protocols and equipment should communicate and work together as one. With the OSI as a standard with in ISO (International Standards Organization) todays current technology does not always conform to the standard of the ISO, but it…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Powerful Essays

    With admirable foresight, the Internet Engineering Task Force (IETF) initiated as early as in 1994, the design and development of a suite of protocols and standards now known as Internet Protocol Version 6 (IPv6), as a worthy tool to phase out and supplant IPv4 over the coming years. There is an explosion of sorts in the number and range of IP capable devices that are being released in the market and the usage of these by an increasingly tech savvy global population. The new protocol aims to effectively support the ever-expanding Internet usage and functionality, and also address security concerns.…

    • 981 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Nt1330 Unit 5 Lab 1 Answers

    • 4778 Words
    • 20 Pages

    Internetworking Basics Internetworking Models The OSI Reference Model Summary Exam Essentials Written Labs Review Questions Answers to Review Questions Answers to Written Lab 1.1 Answers to Written Lab 1.2 Answers to Written Lab 1.3…

    • 4778 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    Palmer, M. & Sinclair R.B., (2003). Guide To Designing and Implementing Local and Wide Area Networks (2nd Edition). Thompson Learning, Inc.…

    • 1409 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Hsc300 Week 2 Assignment

    • 866 Words
    • 4 Pages

    This week we covered some additional information in regards to the data layer, more specifically the MAC layer, and went into the network layer of the OSI model. As part of that we discussed different routing protocols and systems.…

    • 866 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IT245 PH3 DB1

    • 310 Words
    • 1 Page

    For phase 3 discussion board we are ask to describe and compare the Open Systems Interconnection (OSI) model with another network model. For this assignment I will use the Transmission Control Protocol / Internet Protocol (TCP/IP) model. These models divide the communication process of the network into smaller parts. This helps with design, development, and troubling shooting. The OSI model has 7 layers- 1) Physical, 2) Data Link, 3) Network, 4) Transport, 5) Session, 6) Presentation, 7) Application. The TCP/IP model has 4 layers.…

    • 310 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    You can look at Antonio’s behavior and attachment to his mother through the lens of John Bowlby’s theory of attachment and Margaret Mahler’s Theory of Separation-Individuation.…

    • 356 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Final Paper Introduction

    • 578 Words
    • 2 Pages

    First invented in the 1950s by the United State Military during the Cold War, the dynamics of the Internet have gone through a complete transformation. The World Wide Web combined with modern day technology including smart phones, tablet, and laptops, every corner in the globe is open for instant communication. Moreover, combine the ease of use with the…

    • 578 Words
    • 2 Pages
    Good Essays
  • Good Essays

    I would tell Fred to use the Peer-to-Peer architecture or the Client Server architecture both have pro’s and con’s. The reason that I would tell him to use the Peer-to-Peer architecture is in a peer to peer architecture, workstation on the network will be able to shares its files equally with the other buyers. Peer-to-peer networks should be installed in very small businesses, and since this is a small business, it should fit perfectly. They are inexpensive to set up , which is what Fred needs. A peer-to-peer network can support about ten clients and that should be plenty. The key thing to remember about peer-to-peer networking is that it shares files and printers as inexpensively as possible; y. Since Fred’s users are allowed to control access to the resources on their own computers. One thing that you have to be careful with…

    • 453 Words
    • 2 Pages
    Good Essays
  • Good Essays

    UNIT 5 ASSIGNMENT 1

    • 1135 Words
    • 4 Pages

    OSPF’s rules for different types of areas and LSAs can be conceptually more difficult to understand Some customers believe EIGRP is easier to implement, but both are feature-rich and scalable…

    • 1135 Words
    • 4 Pages
    Good Essays