SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
Hameed khan, Ashok Verma, Ajay Lala, Ashish Chourasia / International Journal of
          Engineering Research and Applications (IJERA)         ISSN: 2248-9622
              www.ijera.com Vol. 2, Issue4, July-august 2012, pp.1310-1315
  “ An E -2 -E Communica tion Based MPOLSR Pro toco l
      fo r Loo p Detectio n a nd Iso la tion in MANET”
            Hameed Khan, Ashok Verma, Ajay Lala, Ashish Chourasia
                               Computer Science & Engineering, GGITS Jabalpur




Abstract
         Ad hoc networks consist of a collection of        implementation to validate the functions of the
wireless mobile nodes which dynamically                    protocol.
exchange data without reliance on any fixed based
station or a wired backbone network. They are by           Related work
definition self-organized. The frequent topological                  The objective of this work is to evaluate two
changes make multi-hops routing a crucial issue            protocol pro-active / table driven routing protocols
for these networks. In this paper, we propose a            namely, Optimized Link State Routing Protocol and
multipath routing protocol named Multipath                 Multipath Optimized Link State Routing Protocol. In
Optimized Link State Routing (MP-OLSR). It is a            a proactive routing protocol, called Multipath
multipath extension of OLSR, and can be                    Optimized Link State Routing for MANET is
regarded as a hybrid routing scheme because it             proposed. The protocol inherits the stability of the
combines the proactive nature of topology sensing          link state algorithm. Due to its proactive nature, it has
and reactive nature of multipath computation. The          an advantage of having the routes immediately
auxiliary functions as route recovery and loop             available when needed. MPOLSR is an optimization
detection are introduced to improve the                    of a pure link state protocol for MANET. This
performance of the network.                                evaluation is to be carried out through exhaustive
                                                           literature review and simulation. Then we present the
Keywords: Mobile ad hoc network (MANET),                   functionality     of   MP-OLSR.         The     detailed
multiple paths, OLSR, MP-OLSR,                             specifications for the multipath routing are defined.
                                                           MP-OLSR inherits the topology sensing mechanism
INTRODUCTION                                               from OLSR, which helps the nodes in the network to
          A MANET [1][2]is a collection of nodes           explore the network topology. The Multipath Dijkstra
where the nodes will self configure and self organize      Algorithm is proposed to obtain multiple paths from
themselves forming a wireless medium without any           the source to the destination. Source routing is
requirement of stationary infrastructure like base         employed to forward the packets. To avoid route
station. In these networks each node will not only act     failure and possible transient loops in the network,
as a host but also acts as a router. Due to mobility of    Route Recovery and Loop Detection are introduced
nodes, the topology of the network is dynamic that is,     to improve the performance of the network. The link
it changes most of the time. Some examples where           metric based on queue length information is
the possible use of Ad-hoc networks are in military,       discussed as a possible replacement of the hop count
in emergency situation like hurricanes, earth quakes,      metric. And in the end of the chapter, the problem of
conferences etc. One of the main issues in Ad-hoc          compatibility with OLSR is also illustrated.
networks is to develop a routing protocol which must
be capable of handling very large number of nodes          Specification of MP-OLSR
with limited bandwidth and power availability. Also        Multipath Optimized Link State Routing
they should respond quickly to the hosts that broken       (MP-OLSR)
or newly formed in various locations. Many protocols                 The Multipath Optimized Link State
have been proposed to solve these problems in the          Routing (MP-OLSR) can be regarded as a hybrid
ad-hoc networks.                                           multipath routing protocol. It sends out HELLO
          In this part of the thesis, we expose our main   messages and TC messages periodically to be aware
contribution in the routing protocol: Multipath            of the network topology, just like OLSR. The
Optimized Link State Routing (MP-OLSR). It is a            difference is that MP-OLSR does not always keep a
multipath extension of OLSR, which can be regarded         routing table to all the possible destinations. It only
as a hybrid routing scheme because it combines the         calculates the routes when there are data packets need
proactive nature of topology sensing and reactive          to be sent out. The core functioning of MP-OLSR has
nature of route computation.                               two main parts: topology sensing and route
          We probe the multipath routing protocol          computation. The topology sensing makes the nodes
from design to simulation, and finally the real            get to the topology information of the network, which

                                                                                                  1310 | P a g e
Hameed khan, Ashok Verma, Ajay Lala, Ashish Chourasia / International Journal of
          Engineering Research and Applications (IJERA)         ISSN: 2248-9622
              www.ijera.com Vol. 2, Issue4, July-august 2012, pp.1310-1315
includes link sensing, neighbor detection and             which have selected the sender node as a MPR. TC
topology discovery. This part gets benefit from           messages are flooded to all nodes in the network and
MPRs as well as OLSR. By sending the routing              take advantage of MPRs. MPRs enable a better
control messages proactively, the node could be           scalability in the distribution of topology information.
aware of the topology of the network: its neighbors,      With the broadcast of TC messages to the whole
2-hop neighbors and other links. The routing              network, the node is able to get the topology
computation uses the Multipath Dijkstra Algorithm to      information that is more than two hops away.
populate the multiple paths based on the information
get from the topology sensing. The source route (the      Link Sensing and Neighbor Detection
hops from the source to the destination) will be saved             The link sensing and neighbor detection are
in the header of the data packets. The medium hops        based on the transmission of HELLO messages.
just read the packet head and forward the packet to       Based on the received messages, the procedures
the next hop. The topology sensing and route              called link sensing and neighbor detection are
computation make it possible to find multiple paths       performed to build the link set and 2-hop set. On
from source to destination. In the specification of the   receiving a packet, the node examines the packet
algorithm, the paths will be available and loop-free.     header and each of the message headers. If the
However, in practice, the situation will be much more     message type is known to the node, the message is
complicated due to the change of the topology and         processed locally according to the specification for
the instability of the wireless medium. So route          that message type. The message is also independently
recovery and loop detection are also proposed as          evaluated for forwarding. If parsing fails at any point
auxiliary functionalities to improve the performance      the relevant entity (packet or message) must be
of the protocol. The route recovery can effectively       silently discarded. So the incoming packets (TC or
reduce the packet loss, and the loop detection can be     HELLO) can be appropriately distributed for next
used to avoid potential loops in the network.             step of process. When receiving a HELLO message,
                                                          a router must update its Link set for the MANET
Topology Sensing                                          interface on which the HELLO message is received,
          To get the topology information of the          and update its Neighbor Set. The algorithm will first
network, the nodes use the topology sensing which         find all Neighbor Tuples (henceforth matching
includes link sensing, neighbor detection and             Neighbor      Tuples)    where      the      message’s
topology discovery, just like OLSR. Link sensing          N_neighbor_addr_list contains any network address
populates the local link information base (Link Set).     which overlaps with any address in the node’s
It is exclusively concerned with OLSR interface           Neighbor Address List. If there are no matching
addresses and the ability to exchange packets             neighbor tuples, a new neighbor tuple will be created.
between such OLSR interfaces. Neighbor detection          If there are one or more matches, then related
populates the neighborhood information base               information has to be updated. the procedure to be
(Neighbor Set and 2-hop Neighbor Set) and concerns        performed for Neighbor Set updating. The 1-hop
itself with nodes and their main addresses. Both link     neighbors are then maintained properly based on the
sensing and neighbor detection is based on the            exchange of HELLO messages. In addition to the
periodic exchange of HELLO messages.                      Neighbor Set, the 2-Hop Set also need to be updated.
          Topology      Discovery     generates    the    The procedure to be performed for 2-Hop set
information base which concerns the nodes which are       updating. So the information of the 2-hop nodes is
more than two hops away (Topology Set). It is based       saved in the 2-Hop Set.
on the flooding of the TC messages (optimized by
selecting the MPR set). Through topology sensing,         Topology Discovery
each node in the network can get sufficient                       Link Sensing and Neighbor Detection make
information of the topology to enable routing. The        the node be aware of its 1-Hop neighbors and 2-Hop
link state protocol tries to keep the link information    neighbors by sending HELLO messages. To get the
of the whole network as mentioned above. By               topology information located more than 2 hops away,
default, the path quality is measured by the number       Topology Discovery is needed. It is based on the
of hops. For the purpose of making the thesis self-       broadcast of TC messages. A node with one or more
contained, this part summarized the Topology              OLSRv2 interfaces and with a non-empty neighbor
Sensing functionality.                                    set must generate TC messages. A node with an
          Topology Control Message TC messages are        empty neighbor set should also generate “empty” TC
broadcasted by each node to the whole network to          messages for a period “hold” time after it last
build the intra-forwarding database needed for            generated a non- empty TC message. Complete TC
routing packets. The format of TC message allows          messages are generated and transmitted periodically
the standard [4] and is defined in [5]. A TC message      on all OLSRv2 interfaces, with a default interval
is sent by a node in the network to declare a set of      between two consecutive TC transmissions. In
links, which must include at least the links to all       addition to the periodic broadcasting, it can be
nodes of its MPR Selector set, i.e., the neighbors        generated in response to a change of contents. Only

                                                                                                 1311 | P a g e
Hameed khan, Ashok Verma, Ajay Lala, Ashish Chourasia / International Journal of
          Engineering Research and Applications (IJERA)         ISSN: 2248-9622
              www.ijera.com Vol. 2, Issue4, July-august 2012, pp.1310-1315
MPR can forward the TC messages to the next hop.
When receiving a TC message, it is processed
according to its type. The node first checks the
message is from itself or unavailable. If so, the
message must be discarded. Otherwise, the node will
populate the related information base set (Advertising
Remote Node Set, Topology Set, etc.) based on the
received message. So based on the broadcasting and
processing of TC messages, the topology information
that more than two hops always can be saved in the       Figure 1.1: An example of route recovery. S is the
Topology Set.                                            source and D is the destination.

Route Recovery                                                     The movement increases the end-to-end
Route Failure in MP-OLSR                                 delay significantly. In[8], the authors propose another
         By using the scheme of the Topology             method to avoid the effect of short term link
Sensing, we can obtain the topology information of       deterioration by using opportunistic paths in mesh
the network with the exchange of HELLO and TC            networks. To overcome the disadvantage of the
messages. All this information is saved in the           source routing, we propose Route Recovery for MP-
topology information base of the local node: link set,   OLSR.[7] The principal is very simple: before an
neighbor set or topology set. Ideally, the topology      intermediate node tries to forward a packet to the
information base can be consistent with the real         next hop according to the source route, the node first
topology of the network. However, in reality, it is      checks if the next hop in the source route is one of its
hard to achieve, mainly because of the mobility of the   neighbors (by checking the neighbor set). If yes, the
ad hoc network. Firstly, for the HELLO and TC            packet is forwarded normally. If no, then it is
messages, there are certain intervals during each        possible that the “next hop” is not available anymore.
message generation (2s for HELLO and 5s for TC by        Then the node will recomputed the route and forward
default) [6]. During this period, the topology might     the packet by using the new route. We present an
change because of the movement of the nodes.             example of route recovery. Node S is trying to send
Secondly, when the control messages (especially the      packets to D. The original multiple paths we got are
TC messages) are being transmitted in the network,       S_A_B_D and S_C_E_G_D. However, node G
delay or collision might happen. This will result in     moves out of the transmission range of node E and
the control message being outdated or even lost. Both    makes the second path unavailable. The source node
of the two reasons mentioned above will result in the    S is not able to detect the link failure immediately
inconsistency between the real network topology and      (because of the delay and long interval of TC
the node’s topology information base. This means         messages) and keeps sending the packets along the
that when a node is computing the multiple paths         path and all these packets are dropped during this
based on the information base, it might use links that   period if only the source routing is used. With Route
do not exist anymore, and cause the route failure.       Recovery, when the packet arrives, node E will first
Furthermore, even if the topology information is         check if node G is still one of its neighbors, before
correct when the route is being constructed at the       forwarding the packet according to the source route.
source node, the topology might change while the         If not, node E will recomputed the route to node D,
packets are being forwarded in the network. And          and get E_F_D. Then the following packets will be
because of the source routing scheme MP-OLSR             sent through the new path. Because the Route
uses, the source route cannot be adapted to this kind    Recovery just checks the topology information saved
of changes. For the OLSR, the problem is less serious    in the local node, it will not introduce much extra
because it uses hop-by-hop routing. Unlike the source    delay. And most importantly, it will effectively
routing, whose routes are decided completely at the      improve the packet delivery ratio of the network.
source, the nodes in OLSR just forward the packets
to the next hop. So there is more chance for a node in   Loop Detection
OLSR to forward a packet to the next available link.     Loops in OLSR and MP-OLSR
                                                                  It is important to mention the LLN (Link
Route Recovery Algorithm                                 Layer Notification) before coming to the problem of
          Several techniques already exist in the        the loops of the protocol. LLN is an extended
literature to deal with the route failures in source     functionality defined in [8], and implemented in
routing. DSR handles route errors using route            different OLSR or MPOLSR simulations and
maintenance, mainly by sending RERR messages,            implementations. If link layer information describing
which will of G makes the link from E to G               connectivity to neighbor nodes is available (i.e. loss
unavailable.                                             of connectivity though absence of a link layer
                                                         acknowledgement), this information can be used in
                                                         addition to the information from the HELLO-

                                                                                                1312 | P a g e
Hameed khan, Ashok Verma, Ajay Lala, Ashish Chourasia / International Journal of
          Engineering Research and Applications (IJERA)         ISSN: 2248-9622
              www.ijera.com Vol. 2, Issue4, July-august 2012, pp.1310-1315
message to maintain the neighbor information base          be redirected to node B. The same operation will be
and the MPR selector of the information bases in           performed in node B: LLN of the failure of B_C, and
node A and B. One transient loop is formed between         Route Recovery. Unfortunately, because node B
A and B set.                                               cannot detect the link failure of A_C immediately,
                                                           and the new path obtained by Route Recovery is
                                                           B_A_C. Thus the packet will be returned to node A,
                                                           and node A to B again, creating a loop. This is not a
                                                           permanent loop, but a transient loop which will exist
                                                           for several seconds and will disappear when the
                                                           related link expires. However, this kind of temporary
                                                           loops will block the links in the loop and congest the
                                                           related transmission area. In [9], the authors also
                                                           address the looping issues in OLSRv2, and LLN will
                                                           significantly increase the number of loops.

                                                           Source Route Loop Detection
Figure 1.2: An example of loop in the network. The                   In the authors introduce two types of loop
movement of node C results in inconsistency                detection techniques: LD-Mid (Mid-Loop Detection)
          The routing protocol can act on the              and LD-Post (Post-Loop Detection). LD-Mid just
acknowledgement from LLN (mainly the loss of               compares the address of the next hop against the
links), and remove the corresponding links from its        address of the previous hop, so it is only able to
information base. The results of the real OLSRv2           detect “two-way” loops between 2 nodes. LD-Post
testbed [9] and our work based on NS2 simulation in        records all incoming packets that need to be
can show that LLN is very important and effectively        forwarded and compares against each new incoming
improves the packet delivery ratio of the OLSR and         packet to see if the same packet has traversed this
MP-OLSR protocol. In theory, the paths generated by        node before. So it can detect loops that are farther
the Dijkstra algorithm in MP-OLSR are loop-free.           away, by taking more memory. When a loop is
However, in reality, the LLN and Route Recovery            detected, the Packet Discard strategy is used to drop
which are used to adapt to the topology changes            the packets that are unlikely to reach the destination
make the loops possible in the network. With LLN,          but only increase the load of the network. For MP-
when a node tries to send a packet over a link but fail    OLSR, we propose a simple method based on source
in the end, the link layer will give a feedback to the     routing that can effectively detect loops without
routing protocol to notify the link loss. This kind of     causing extra cost of memory: after the Route
abrupt interruption will result in additional operations   Recovery is performed, we can get a new set of
on the topology information base rather than just          multiple paths from the current node to the
regular HELLO and TC messages. This means that             destination. The node will compare the first new path
other nodes cannot be aware of these changes               with the ancient source route in the packet. We can
immediately. So LLN might cause some                       verify if the new path includes the nodes that the
inconsistency of the topology information in different     packet had crossed before. If the answer is no, it
nodes. And with Route Recovery, which might                means that there will be no loop in the future, and we
change the path in intermediate nodes, loops can           will make use of the new path. If the new path
occur temporarily in the network. In Figure 1.1 we         includes the node that the packet have passed before,
give an example of how a loop is generated in the          there is high probability that a loop will happen (a
network. Node A is an intermediate node of a path.         very rare case is that the failed link is recovered in
The packets with source route A_C arrive at node A         this short period, in several milliseconds, then the
and need to be forwarded to node C. Then node C            loop is released). MP-OLSR will switch to the next
moves out of the transmission range of node A and          path of the multiple paths set, until all the paths have
node B,and makes the links A_C, B_C not available          been verified. If there is no suitable path, the packet
anymore. When the new packets arrive at node A, the        will be discarded. For the example in Figure 1.1,
transmission to node C will fail. Then in node A, the      node A will get a path A_B_C by Route Recovery.
routing protocol will be acknowledged by LLN, and          Then when the packet arrives at node B, a new path
it will remove the link A_C from node A’s link set.        B_A_C will be generated because of link breakage of
For node A, although it can detect the link failure of     B_C. Node B will compare the new one with the
A_C by LLN, it is hard to know the failure of B_C          ancient source route A_B_C in the packet. We will
immediately. This is because link B_C can only be          find that the packet has already crossed node A, and
removed when the NEIGHB HOLD TIME (6                       so there might be a loop. Then we will try to find if
seconds by default) expires. In the meantime, Route        there is any other possible path, or else the packet
Recovery will be awaken. A new path A_B_C will be          will be discarded. Compared with LD-Post, which
established and the following packets will be              needs to keep a record of all the incoming packets,
forwarded along the new path. Then the packets will        our loop detection mechanism could effectively

                                                                                                  1313 | P a g e
Hameed khan, Ashok Verma, Ajay Lala, Ashish Chourasia / International Journal of
            Engineering Research and Applications (IJERA)          ISSN: 2248-9622
                  www.ijera.com Vol. 2, Issue4, July-august 2012, pp.1310-1315
detect the possible loops in the network without  End to End Delay
consuming extra memory space. By reducing the                   The figure shows that initially for 2 nodes
loops in the network, the network congestion can be    the End-2- End delay is minor difference between
reduced. So the performance of the network can be      OLSR and MPOLSR protocol. As the 10 nodes
improved, especially the end-to-end delay.             increases the End-2- End delay for OLSR is greater
                                                       as compared to MPOLSR. But again MPOLSR and
RESULTS AND DISCUSSIONS                                OLSR protocol just approximate equal for 20 nodes.
Packet Delivery Fraction                               The End-2- End delay is gradually increase when we
         The figure shows that initially for 2 nodes   set 30 nodes MPOLSR and OLSR protocol are also
the PDF is highest for MPOLSR protocol while the       increase but gradually lesser then MPOLSR in N/W.
PDF for OLSR are moderate. As the no of nodes
increases the PDF for MPOLSR and OLSR decreases           250
gradually but again MPOLSR is greater than OLSR
protocol for 10 nodes. The PDF is highest when            200
increase 20 nodes we found both protocol                  150
approximately equal and finally 30 node case both         100                                    MPOLSR
protocol decrease gradually with minor difference.
                                                           50                                    OLSR
                                                            0
   1.01
      1                                                           2   10 20 30
   0.99                                                         node node node node
   0.98
   0.97                                   MPOLSR
                                                       Fig 7.3: End-2- End delay
   0.96                                   OLSR
   0.95                                                Conclusion
           2    10 20 30                                         In this chapter, the specifications of MP-
          node node node node                          OLSR are introduced. The topology sensing (based
                                                       on OLSR) and route computation are basic
                                                       procedures for multipath routing. To improve the
           Fig 7.1: Packet Delivery Fraction           performance of the protocol, the route recovery and
                                                       loop detection are proposed to avoid route failure and
Throughput                                             reduce transient loops in the network. We proposed a
         The figure shows that initially for 2 nodes   queue length metric to evaluate the link quality. The
the THROUGHPUT is highest for OLSR protocol            queue length information is saved in TLVs and
while the THROUGHPUT for MPOLSR is moderate.           propagated to the whole network by HELLO and TC
As the 10 nodes increases the THROUGHPUT for           messages. The compatibility between MP-OLSR and
MPOLSR is greater and OLSR decreased gradually         OLSR are also studied to make the single path
but again MPOLSR is greater than OLSR protocol         routing and multipath routing is able to cooperate
just approximate for 20 nodes. The THROUGHPUT          with each other. This further study highlights the
is approximately equal when we set 30 nodes OLSR       interest of multiple paths routing to improve quality
and MPOLSR protocol in network.                        of experience over self-organized networks.

                                                       References
   800
                                                         [1]    A. A. Pirzada, C. McDonald, and A. Datta,
   600                                                          “Performance Comparison of Trust-Based
                                                                Reactive     Routing    Protocols,”     IEEE
   400
                                          MPOLSR                Transactions on Mobile Computing Vol. 5,
   200                                                          No.6 ,pp. 695- 710, 2006 .
                                          OLSR           [2]    Mamoun H. Mamoun “ Important
     0
                                                                Characteristic of Differences between DSR
            2   10 20 30                                        and AODV Routing Protocol” 2007
          node node node node                            [3]    Clausen, T. & Jacquet, P. (2003). IETF
                                                                Request for Comments: 3626, Optimized
                                                                Link State Routing Protocol OLSR.
                                                         [4]    Clausen, T., Dearlove, C., Dean, J., & Adjih,
Fig 7.2: Throughput                                             C. (2009c). IETF Request for Comments:
                                                                5444, Generalized Mobile Ad Hoc Network
                                                                (MANET) Packet/Message Format.


                                                                                            1314 | P a g e
Hameed khan, Ashok Verma, Ajay Lala, Ashish Chourasia / International Journal of
          Engineering Research and Applications (IJERA)         ISSN: 2248-9622
              www.ijera.com Vol. 2, Issue4, July-august 2012, pp.1310-1315
[5]     Clausen, T., Dearlove, C., & Jacquet, P.
        (2009b). IETF Internet Draft, The
        Optimized Link State Routing Protocol
        version 2, draft-ietf-manet-olsrv2-10.
[6]     Jiazi Yi, Eddy Cizeron, Salima Hamma,
        Benoît        Parrein        and       Pascal
        Lesage*Implementation of multipath and
        Multiple Description Coding in OLSR This
        is    a    proceeding     of    4th    OLSR
        Introp/Workshop, Ottawa, Canada.
[7]     Jiazi YI, Asmaa ADNANE, Sylvain
        DAVID, Benoˆıt PARREIN Multipath
        Optimized Link State Routing for Mobile ad
        hoc Networks Preprint submitted to Ad Hoc
        Networks September 28, 2010
[8]     Speakman, L., Owada, Y., & Mase, K.
        (2008). An analysis of loop formation in
        OLSRv2 in adhoc networks and limiting its
        negative impact. In IEEE International CQR
        Workshop, Naples, Florida, USA.
[9]     Clausen, T. & Jacquet, P. (2003). IETF
        Request for Comments: 3626, Optimized
        Link State Routing Protocol OLSR.




                                                                              1315 | P a g e

Más contenido relacionado

La actualidad más candente

Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
idescitation
 
An Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETAn Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANET
KhushbooGupta145
 

La actualidad más candente (16)

Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
Ho2413421346
Ho2413421346Ho2413421346
Ho2413421346
 
Hd3612761280
Hd3612761280Hd3612761280
Hd3612761280
 
Ab25144148
Ab25144148Ab25144148
Ab25144148
 
An Insight on Routing
An Insight on RoutingAn Insight on Routing
An Insight on Routing
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
Shortest Tree Routing With Security In Wireless Sensor Networks
Shortest Tree Routing With Security In Wireless Sensor NetworksShortest Tree Routing With Security In Wireless Sensor Networks
Shortest Tree Routing With Security In Wireless Sensor Networks
 
Gateway Forwarding Schemes For Manet-Internet Connectivity
Gateway Forwarding Schemes For Manet-Internet ConnectivityGateway Forwarding Schemes For Manet-Internet Connectivity
Gateway Forwarding Schemes For Manet-Internet Connectivity
 
An Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETAn Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANET
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantification
 

Destacado

Amith Xavier updated
Amith Xavier updatedAmith Xavier updated
Amith Xavier updated
amith xavier
 

Destacado (20)

My2421322135
My2421322135My2421322135
My2421322135
 
Iv2515741577
Iv2515741577Iv2515741577
Iv2515741577
 
Gr2411971203
Gr2411971203Gr2411971203
Gr2411971203
 
Id2414301437
Id2414301437Id2414301437
Id2414301437
 
Gz2412431253
Gz2412431253Gz2412431253
Gz2412431253
 
Gu2412131219
Gu2412131219Gu2412131219
Gu2412131219
 
Iy2515891593
Iy2515891593Iy2515891593
Iy2515891593
 
Jc2516111615
Jc2516111615Jc2516111615
Jc2516111615
 
Ia2514401444
Ia2514401444Ia2514401444
Ia2514401444
 
Hh2513151319
Hh2513151319Hh2513151319
Hh2513151319
 
Ht2413701376
Ht2413701376Ht2413701376
Ht2413701376
 
Ji2516561662
Ji2516561662Ji2516561662
Ji2516561662
 
Hr2413591363
Hr2413591363Hr2413591363
Hr2413591363
 
Hd2412771281
Hd2412771281Hd2412771281
Hd2412771281
 
Hy2514281431
Hy2514281431Hy2514281431
Hy2514281431
 
Ir2515501556
Ir2515501556Ir2515501556
Ir2515501556
 
La2418611866
La2418611866La2418611866
La2418611866
 
Hn2413371341
Hn2413371341Hn2413371341
Hn2413371341
 
Hx2413921400
Hx2413921400Hx2413921400
Hx2413921400
 
Amith Xavier updated
Amith Xavier updatedAmith Xavier updated
Amith Xavier updated
 

Similar a Hj2413101315

A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A Review
BRNSSPublicationHubI
 
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...
eSAT Journals
 

Similar a Hj2413101315 (20)

A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A Review
 
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
 
O26087092
O26087092O26087092
O26087092
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
 
J0935461
J0935461J0935461
J0935461
 
Research on performance of routing protocols in manet
Research on performance of routing protocols in manetResearch on performance of routing protocols in manet
Research on performance of routing protocols in manet
 
Hs2413641369
Hs2413641369Hs2413641369
Hs2413641369
 
Ft3410671073
Ft3410671073Ft3410671073
Ft3410671073
 
IJET-V2I6P7
IJET-V2I6P7IJET-V2I6P7
IJET-V2I6P7
 
Extension of Optimized Linked State Routing Protocol For Energy Efficient App...
Extension of Optimized Linked State Routing Protocol For Energy Efficient App...Extension of Optimized Linked State Routing Protocol For Energy Efficient App...
Extension of Optimized Linked State Routing Protocol For Energy Efficient App...
 
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission using
 
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
Wireless sensor network
Wireless sensor network  Wireless sensor network
Wireless sensor network
 
Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
 
E010322531
E010322531E010322531
E010322531
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Hj2413101315

  • 1. Hameed khan, Ashok Verma, Ajay Lala, Ashish Chourasia / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-august 2012, pp.1310-1315 “ An E -2 -E Communica tion Based MPOLSR Pro toco l fo r Loo p Detectio n a nd Iso la tion in MANET” Hameed Khan, Ashok Verma, Ajay Lala, Ashish Chourasia Computer Science & Engineering, GGITS Jabalpur Abstract Ad hoc networks consist of a collection of implementation to validate the functions of the wireless mobile nodes which dynamically protocol. exchange data without reliance on any fixed based station or a wired backbone network. They are by Related work definition self-organized. The frequent topological The objective of this work is to evaluate two changes make multi-hops routing a crucial issue protocol pro-active / table driven routing protocols for these networks. In this paper, we propose a namely, Optimized Link State Routing Protocol and multipath routing protocol named Multipath Multipath Optimized Link State Routing Protocol. In Optimized Link State Routing (MP-OLSR). It is a a proactive routing protocol, called Multipath multipath extension of OLSR, and can be Optimized Link State Routing for MANET is regarded as a hybrid routing scheme because it proposed. The protocol inherits the stability of the combines the proactive nature of topology sensing link state algorithm. Due to its proactive nature, it has and reactive nature of multipath computation. The an advantage of having the routes immediately auxiliary functions as route recovery and loop available when needed. MPOLSR is an optimization detection are introduced to improve the of a pure link state protocol for MANET. This performance of the network. evaluation is to be carried out through exhaustive literature review and simulation. Then we present the Keywords: Mobile ad hoc network (MANET), functionality of MP-OLSR. The detailed multiple paths, OLSR, MP-OLSR, specifications for the multipath routing are defined. MP-OLSR inherits the topology sensing mechanism INTRODUCTION from OLSR, which helps the nodes in the network to A MANET [1][2]is a collection of nodes explore the network topology. The Multipath Dijkstra where the nodes will self configure and self organize Algorithm is proposed to obtain multiple paths from themselves forming a wireless medium without any the source to the destination. Source routing is requirement of stationary infrastructure like base employed to forward the packets. To avoid route station. In these networks each node will not only act failure and possible transient loops in the network, as a host but also acts as a router. Due to mobility of Route Recovery and Loop Detection are introduced nodes, the topology of the network is dynamic that is, to improve the performance of the network. The link it changes most of the time. Some examples where metric based on queue length information is the possible use of Ad-hoc networks are in military, discussed as a possible replacement of the hop count in emergency situation like hurricanes, earth quakes, metric. And in the end of the chapter, the problem of conferences etc. One of the main issues in Ad-hoc compatibility with OLSR is also illustrated. networks is to develop a routing protocol which must be capable of handling very large number of nodes Specification of MP-OLSR with limited bandwidth and power availability. Also Multipath Optimized Link State Routing they should respond quickly to the hosts that broken (MP-OLSR) or newly formed in various locations. Many protocols The Multipath Optimized Link State have been proposed to solve these problems in the Routing (MP-OLSR) can be regarded as a hybrid ad-hoc networks. multipath routing protocol. It sends out HELLO In this part of the thesis, we expose our main messages and TC messages periodically to be aware contribution in the routing protocol: Multipath of the network topology, just like OLSR. The Optimized Link State Routing (MP-OLSR). It is a difference is that MP-OLSR does not always keep a multipath extension of OLSR, which can be regarded routing table to all the possible destinations. It only as a hybrid routing scheme because it combines the calculates the routes when there are data packets need proactive nature of topology sensing and reactive to be sent out. The core functioning of MP-OLSR has nature of route computation. two main parts: topology sensing and route We probe the multipath routing protocol computation. The topology sensing makes the nodes from design to simulation, and finally the real get to the topology information of the network, which 1310 | P a g e
  • 2. Hameed khan, Ashok Verma, Ajay Lala, Ashish Chourasia / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-august 2012, pp.1310-1315 includes link sensing, neighbor detection and which have selected the sender node as a MPR. TC topology discovery. This part gets benefit from messages are flooded to all nodes in the network and MPRs as well as OLSR. By sending the routing take advantage of MPRs. MPRs enable a better control messages proactively, the node could be scalability in the distribution of topology information. aware of the topology of the network: its neighbors, With the broadcast of TC messages to the whole 2-hop neighbors and other links. The routing network, the node is able to get the topology computation uses the Multipath Dijkstra Algorithm to information that is more than two hops away. populate the multiple paths based on the information get from the topology sensing. The source route (the Link Sensing and Neighbor Detection hops from the source to the destination) will be saved The link sensing and neighbor detection are in the header of the data packets. The medium hops based on the transmission of HELLO messages. just read the packet head and forward the packet to Based on the received messages, the procedures the next hop. The topology sensing and route called link sensing and neighbor detection are computation make it possible to find multiple paths performed to build the link set and 2-hop set. On from source to destination. In the specification of the receiving a packet, the node examines the packet algorithm, the paths will be available and loop-free. header and each of the message headers. If the However, in practice, the situation will be much more message type is known to the node, the message is complicated due to the change of the topology and processed locally according to the specification for the instability of the wireless medium. So route that message type. The message is also independently recovery and loop detection are also proposed as evaluated for forwarding. If parsing fails at any point auxiliary functionalities to improve the performance the relevant entity (packet or message) must be of the protocol. The route recovery can effectively silently discarded. So the incoming packets (TC or reduce the packet loss, and the loop detection can be HELLO) can be appropriately distributed for next used to avoid potential loops in the network. step of process. When receiving a HELLO message, a router must update its Link set for the MANET Topology Sensing interface on which the HELLO message is received, To get the topology information of the and update its Neighbor Set. The algorithm will first network, the nodes use the topology sensing which find all Neighbor Tuples (henceforth matching includes link sensing, neighbor detection and Neighbor Tuples) where the message’s topology discovery, just like OLSR. Link sensing N_neighbor_addr_list contains any network address populates the local link information base (Link Set). which overlaps with any address in the node’s It is exclusively concerned with OLSR interface Neighbor Address List. If there are no matching addresses and the ability to exchange packets neighbor tuples, a new neighbor tuple will be created. between such OLSR interfaces. Neighbor detection If there are one or more matches, then related populates the neighborhood information base information has to be updated. the procedure to be (Neighbor Set and 2-hop Neighbor Set) and concerns performed for Neighbor Set updating. The 1-hop itself with nodes and their main addresses. Both link neighbors are then maintained properly based on the sensing and neighbor detection is based on the exchange of HELLO messages. In addition to the periodic exchange of HELLO messages. Neighbor Set, the 2-Hop Set also need to be updated. Topology Discovery generates the The procedure to be performed for 2-Hop set information base which concerns the nodes which are updating. So the information of the 2-hop nodes is more than two hops away (Topology Set). It is based saved in the 2-Hop Set. on the flooding of the TC messages (optimized by selecting the MPR set). Through topology sensing, Topology Discovery each node in the network can get sufficient Link Sensing and Neighbor Detection make information of the topology to enable routing. The the node be aware of its 1-Hop neighbors and 2-Hop link state protocol tries to keep the link information neighbors by sending HELLO messages. To get the of the whole network as mentioned above. By topology information located more than 2 hops away, default, the path quality is measured by the number Topology Discovery is needed. It is based on the of hops. For the purpose of making the thesis self- broadcast of TC messages. A node with one or more contained, this part summarized the Topology OLSRv2 interfaces and with a non-empty neighbor Sensing functionality. set must generate TC messages. A node with an Topology Control Message TC messages are empty neighbor set should also generate “empty” TC broadcasted by each node to the whole network to messages for a period “hold” time after it last build the intra-forwarding database needed for generated a non- empty TC message. Complete TC routing packets. The format of TC message allows messages are generated and transmitted periodically the standard [4] and is defined in [5]. A TC message on all OLSRv2 interfaces, with a default interval is sent by a node in the network to declare a set of between two consecutive TC transmissions. In links, which must include at least the links to all addition to the periodic broadcasting, it can be nodes of its MPR Selector set, i.e., the neighbors generated in response to a change of contents. Only 1311 | P a g e
  • 3. Hameed khan, Ashok Verma, Ajay Lala, Ashish Chourasia / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-august 2012, pp.1310-1315 MPR can forward the TC messages to the next hop. When receiving a TC message, it is processed according to its type. The node first checks the message is from itself or unavailable. If so, the message must be discarded. Otherwise, the node will populate the related information base set (Advertising Remote Node Set, Topology Set, etc.) based on the received message. So based on the broadcasting and processing of TC messages, the topology information that more than two hops always can be saved in the Figure 1.1: An example of route recovery. S is the Topology Set. source and D is the destination. Route Recovery The movement increases the end-to-end Route Failure in MP-OLSR delay significantly. In[8], the authors propose another By using the scheme of the Topology method to avoid the effect of short term link Sensing, we can obtain the topology information of deterioration by using opportunistic paths in mesh the network with the exchange of HELLO and TC networks. To overcome the disadvantage of the messages. All this information is saved in the source routing, we propose Route Recovery for MP- topology information base of the local node: link set, OLSR.[7] The principal is very simple: before an neighbor set or topology set. Ideally, the topology intermediate node tries to forward a packet to the information base can be consistent with the real next hop according to the source route, the node first topology of the network. However, in reality, it is checks if the next hop in the source route is one of its hard to achieve, mainly because of the mobility of the neighbors (by checking the neighbor set). If yes, the ad hoc network. Firstly, for the HELLO and TC packet is forwarded normally. If no, then it is messages, there are certain intervals during each possible that the “next hop” is not available anymore. message generation (2s for HELLO and 5s for TC by Then the node will recomputed the route and forward default) [6]. During this period, the topology might the packet by using the new route. We present an change because of the movement of the nodes. example of route recovery. Node S is trying to send Secondly, when the control messages (especially the packets to D. The original multiple paths we got are TC messages) are being transmitted in the network, S_A_B_D and S_C_E_G_D. However, node G delay or collision might happen. This will result in moves out of the transmission range of node E and the control message being outdated or even lost. Both makes the second path unavailable. The source node of the two reasons mentioned above will result in the S is not able to detect the link failure immediately inconsistency between the real network topology and (because of the delay and long interval of TC the node’s topology information base. This means messages) and keeps sending the packets along the that when a node is computing the multiple paths path and all these packets are dropped during this based on the information base, it might use links that period if only the source routing is used. With Route do not exist anymore, and cause the route failure. Recovery, when the packet arrives, node E will first Furthermore, even if the topology information is check if node G is still one of its neighbors, before correct when the route is being constructed at the forwarding the packet according to the source route. source node, the topology might change while the If not, node E will recomputed the route to node D, packets are being forwarded in the network. And and get E_F_D. Then the following packets will be because of the source routing scheme MP-OLSR sent through the new path. Because the Route uses, the source route cannot be adapted to this kind Recovery just checks the topology information saved of changes. For the OLSR, the problem is less serious in the local node, it will not introduce much extra because it uses hop-by-hop routing. Unlike the source delay. And most importantly, it will effectively routing, whose routes are decided completely at the improve the packet delivery ratio of the network. source, the nodes in OLSR just forward the packets to the next hop. So there is more chance for a node in Loop Detection OLSR to forward a packet to the next available link. Loops in OLSR and MP-OLSR It is important to mention the LLN (Link Route Recovery Algorithm Layer Notification) before coming to the problem of Several techniques already exist in the the loops of the protocol. LLN is an extended literature to deal with the route failures in source functionality defined in [8], and implemented in routing. DSR handles route errors using route different OLSR or MPOLSR simulations and maintenance, mainly by sending RERR messages, implementations. If link layer information describing which will of G makes the link from E to G connectivity to neighbor nodes is available (i.e. loss unavailable. of connectivity though absence of a link layer acknowledgement), this information can be used in addition to the information from the HELLO- 1312 | P a g e
  • 4. Hameed khan, Ashok Verma, Ajay Lala, Ashish Chourasia / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-august 2012, pp.1310-1315 message to maintain the neighbor information base be redirected to node B. The same operation will be and the MPR selector of the information bases in performed in node B: LLN of the failure of B_C, and node A and B. One transient loop is formed between Route Recovery. Unfortunately, because node B A and B set. cannot detect the link failure of A_C immediately, and the new path obtained by Route Recovery is B_A_C. Thus the packet will be returned to node A, and node A to B again, creating a loop. This is not a permanent loop, but a transient loop which will exist for several seconds and will disappear when the related link expires. However, this kind of temporary loops will block the links in the loop and congest the related transmission area. In [9], the authors also address the looping issues in OLSRv2, and LLN will significantly increase the number of loops. Source Route Loop Detection Figure 1.2: An example of loop in the network. The In the authors introduce two types of loop movement of node C results in inconsistency detection techniques: LD-Mid (Mid-Loop Detection) The routing protocol can act on the and LD-Post (Post-Loop Detection). LD-Mid just acknowledgement from LLN (mainly the loss of compares the address of the next hop against the links), and remove the corresponding links from its address of the previous hop, so it is only able to information base. The results of the real OLSRv2 detect “two-way” loops between 2 nodes. LD-Post testbed [9] and our work based on NS2 simulation in records all incoming packets that need to be can show that LLN is very important and effectively forwarded and compares against each new incoming improves the packet delivery ratio of the OLSR and packet to see if the same packet has traversed this MP-OLSR protocol. In theory, the paths generated by node before. So it can detect loops that are farther the Dijkstra algorithm in MP-OLSR are loop-free. away, by taking more memory. When a loop is However, in reality, the LLN and Route Recovery detected, the Packet Discard strategy is used to drop which are used to adapt to the topology changes the packets that are unlikely to reach the destination make the loops possible in the network. With LLN, but only increase the load of the network. For MP- when a node tries to send a packet over a link but fail OLSR, we propose a simple method based on source in the end, the link layer will give a feedback to the routing that can effectively detect loops without routing protocol to notify the link loss. This kind of causing extra cost of memory: after the Route abrupt interruption will result in additional operations Recovery is performed, we can get a new set of on the topology information base rather than just multiple paths from the current node to the regular HELLO and TC messages. This means that destination. The node will compare the first new path other nodes cannot be aware of these changes with the ancient source route in the packet. We can immediately. So LLN might cause some verify if the new path includes the nodes that the inconsistency of the topology information in different packet had crossed before. If the answer is no, it nodes. And with Route Recovery, which might means that there will be no loop in the future, and we change the path in intermediate nodes, loops can will make use of the new path. If the new path occur temporarily in the network. In Figure 1.1 we includes the node that the packet have passed before, give an example of how a loop is generated in the there is high probability that a loop will happen (a network. Node A is an intermediate node of a path. very rare case is that the failed link is recovered in The packets with source route A_C arrive at node A this short period, in several milliseconds, then the and need to be forwarded to node C. Then node C loop is released). MP-OLSR will switch to the next moves out of the transmission range of node A and path of the multiple paths set, until all the paths have node B,and makes the links A_C, B_C not available been verified. If there is no suitable path, the packet anymore. When the new packets arrive at node A, the will be discarded. For the example in Figure 1.1, transmission to node C will fail. Then in node A, the node A will get a path A_B_C by Route Recovery. routing protocol will be acknowledged by LLN, and Then when the packet arrives at node B, a new path it will remove the link A_C from node A’s link set. B_A_C will be generated because of link breakage of For node A, although it can detect the link failure of B_C. Node B will compare the new one with the A_C by LLN, it is hard to know the failure of B_C ancient source route A_B_C in the packet. We will immediately. This is because link B_C can only be find that the packet has already crossed node A, and removed when the NEIGHB HOLD TIME (6 so there might be a loop. Then we will try to find if seconds by default) expires. In the meantime, Route there is any other possible path, or else the packet Recovery will be awaken. A new path A_B_C will be will be discarded. Compared with LD-Post, which established and the following packets will be needs to keep a record of all the incoming packets, forwarded along the new path. Then the packets will our loop detection mechanism could effectively 1313 | P a g e
  • 5. Hameed khan, Ashok Verma, Ajay Lala, Ashish Chourasia / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-august 2012, pp.1310-1315 detect the possible loops in the network without End to End Delay consuming extra memory space. By reducing the The figure shows that initially for 2 nodes loops in the network, the network congestion can be the End-2- End delay is minor difference between reduced. So the performance of the network can be OLSR and MPOLSR protocol. As the 10 nodes improved, especially the end-to-end delay. increases the End-2- End delay for OLSR is greater as compared to MPOLSR. But again MPOLSR and RESULTS AND DISCUSSIONS OLSR protocol just approximate equal for 20 nodes. Packet Delivery Fraction The End-2- End delay is gradually increase when we The figure shows that initially for 2 nodes set 30 nodes MPOLSR and OLSR protocol are also the PDF is highest for MPOLSR protocol while the increase but gradually lesser then MPOLSR in N/W. PDF for OLSR are moderate. As the no of nodes increases the PDF for MPOLSR and OLSR decreases 250 gradually but again MPOLSR is greater than OLSR protocol for 10 nodes. The PDF is highest when 200 increase 20 nodes we found both protocol 150 approximately equal and finally 30 node case both 100 MPOLSR protocol decrease gradually with minor difference. 50 OLSR 0 1.01 1 2 10 20 30 0.99 node node node node 0.98 0.97 MPOLSR Fig 7.3: End-2- End delay 0.96 OLSR 0.95 Conclusion 2 10 20 30 In this chapter, the specifications of MP- node node node node OLSR are introduced. The topology sensing (based on OLSR) and route computation are basic procedures for multipath routing. To improve the Fig 7.1: Packet Delivery Fraction performance of the protocol, the route recovery and loop detection are proposed to avoid route failure and Throughput reduce transient loops in the network. We proposed a The figure shows that initially for 2 nodes queue length metric to evaluate the link quality. The the THROUGHPUT is highest for OLSR protocol queue length information is saved in TLVs and while the THROUGHPUT for MPOLSR is moderate. propagated to the whole network by HELLO and TC As the 10 nodes increases the THROUGHPUT for messages. The compatibility between MP-OLSR and MPOLSR is greater and OLSR decreased gradually OLSR are also studied to make the single path but again MPOLSR is greater than OLSR protocol routing and multipath routing is able to cooperate just approximate for 20 nodes. The THROUGHPUT with each other. This further study highlights the is approximately equal when we set 30 nodes OLSR interest of multiple paths routing to improve quality and MPOLSR protocol in network. of experience over self-organized networks. References 800 [1] A. A. Pirzada, C. McDonald, and A. Datta, 600 “Performance Comparison of Trust-Based Reactive Routing Protocols,” IEEE 400 MPOLSR Transactions on Mobile Computing Vol. 5, 200 No.6 ,pp. 695- 710, 2006 . OLSR [2] Mamoun H. Mamoun “ Important 0 Characteristic of Differences between DSR 2 10 20 30 and AODV Routing Protocol” 2007 node node node node [3] Clausen, T. & Jacquet, P. (2003). IETF Request for Comments: 3626, Optimized Link State Routing Protocol OLSR. [4] Clausen, T., Dearlove, C., Dean, J., & Adjih, Fig 7.2: Throughput C. (2009c). IETF Request for Comments: 5444, Generalized Mobile Ad Hoc Network (MANET) Packet/Message Format. 1314 | P a g e
  • 6. Hameed khan, Ashok Verma, Ajay Lala, Ashish Chourasia / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-august 2012, pp.1310-1315 [5] Clausen, T., Dearlove, C., & Jacquet, P. (2009b). IETF Internet Draft, The Optimized Link State Routing Protocol version 2, draft-ietf-manet-olsrv2-10. [6] Jiazi Yi, Eddy Cizeron, Salima Hamma, Benoît Parrein and Pascal Lesage*Implementation of multipath and Multiple Description Coding in OLSR This is a proceeding of 4th OLSR Introp/Workshop, Ottawa, Canada. [7] Jiazi YI, Asmaa ADNANE, Sylvain DAVID, Benoˆıt PARREIN Multipath Optimized Link State Routing for Mobile ad hoc Networks Preprint submitted to Ad Hoc Networks September 28, 2010 [8] Speakman, L., Owada, Y., & Mase, K. (2008). An analysis of loop formation in OLSRv2 in adhoc networks and limiting its negative impact. In IEEE International CQR Workshop, Naples, Florida, USA. [9] Clausen, T. & Jacquet, P. (2003). IETF Request for Comments: 3626, Optimized Link State Routing Protocol OLSR. 1315 | P a g e