0% found this document useful (0 votes)
35 views38 pages

Table of Content Mobile Ad Hoc Network

This document provides an overview of chapters in a book about mobile ad hoc networks (MANETs). Chapter 1 discusses MANETs and issues in ad hoc networks, including traditional IP routing not being designed for dynamic network topologies. It introduces the IETF MANET working group. Chapter 2 covers routing protocols for ad hoc wireless networks. Chapter 3 and 4 introduce two specific MANET routing protocols: AODV and OLSR. Chapter 5 delves into OLSR functionality. Chapter 6 compares the performance of AODV and OLSR using an OPNET network simulator.

Uploaded by

Zaffar Nazar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views38 pages

Table of Content Mobile Ad Hoc Network

This document provides an overview of chapters in a book about mobile ad hoc networks (MANETs). Chapter 1 discusses MANETs and issues in ad hoc networks, including traditional IP routing not being designed for dynamic network topologies. It introduces the IETF MANET working group. Chapter 2 covers routing protocols for ad hoc wireless networks. Chapter 3 and 4 introduce two specific MANET routing protocols: AODV and OLSR. Chapter 5 delves into OLSR functionality. Chapter 6 compares the performance of AODV and OLSR using an OPNET network simulator.

Uploaded by

Zaffar Nazar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 38

TABLE OF CONTENT

Chapter 1

MOBILE AD HOC NETWORK


1 Ad hoc network

1.2 Issue in Ad hoc network

1.3 Traditional IP routing

1.4 The MANET IBTF working group

1.5 MANET and Mobile IP

1.6 Radio technology

1.7 Issues in wireless networks

Chapter 2

MANET ROUTING
2.1 routing in ad hoc wireless network

2.2 Protocols

Chapter 3

INTRODUCTION TO AODV
3.1 Introduction to AODV

3.1.1 AODV control message types

3.2 Sequence numbers

3.3 Counting infinity.

3.4 Route discovery

3.4.1 Example of route discovery

3.5 The expanding ring search

3.6 Link breakage


Chapter 4

INTRODUCTION TO OLSR
4.1 Introduction to OLSR

4.2 Control messages

4.3 Multipoint relays

4.4 Selection of Multipoint relay nodes

4.5 Neighbor discovery

4.6 Topology information

4.7 Route calculation

Chapter 5

OLSR CORE FUNCTIONALITY


5.1 Node addressing

5.2 Information repositories

5.3 Control traffic

5.3.1 Packet format

5.3.2 Message types

5.4 Multipoint relaying

5.4.1 Multipoint relaying

5.4.2 Forwarding OLSR traffic

5.4.3 Link set optimization

5.5 Using multiple interfaces

5.6 Neighbor discovery

5.6.1 Link sensing

5.6.2 Neighbor detection


5.6.3 Two hop neighbor detection

5.6.4 MPR selector detection

.7 Link state declaration.

5.7 .1 Advertised neighbor sequence number

5.7.2 Populating the topology set

5.8 Route calculation

5.9 Overview

Chapter 6

COMPARING THE PROTOCOLS


6.1 Introduction of OPNET simulator

6.2 Configuration Steps

6.3 Performance Comparison of Both Protocols

6.4 Overview

6.5 Resource usage

6.6 Mobility

6.7 Route discovery delay

6.8 Conclusion

6.9 Future work

References
Chapter 1

MOBILE AD-HOC NETWORKS


Mobile Ad-Hoc Networks
In ad hoc networks, all the nodes themselves are responsible for routing and forwarding. No routing is
necessary. But, on the other hand, if the nodes have moved out of range from each other, and therefore
are not able to communicate directly, intermediate nodes are needed to make up the network in which
the packets are to be transmitted. Much wireless technology is based upon the principle of direct point-
to-point communication. Popular solutions like Group Standard for Mobile communications (GSM) and
Wireless Local Area Network (WLAN) both uses an approach where mobile nodes communicate directly
with some centralized access point. These types of networks demand centralization for configuration
and operation. Contrary to this model is the multi-hop approach. In multi-hop scenarios, nodes can
communicate by utilizing other nodes as relays for traffic if the endpoint is out of direct communication
range.

1.1. Ad-hoc networks


Centralized networks, such as GSM, cannot be used in all situations. Significant examples of such
scenarios include establishing survivable, efficient, dynamic communication for rescue operations,
disaster relief efforts and military networks. Such network scenarios cannot rely on centralized and
organized connectivity; they can be conceived as applications of MANETs. The set of applications for
MANETs is diverse, ranging Rom small, static networks that are constrained by power sources, to large-
scale mobile, highly dynamic networks .To enable multi-hop communication in a distributed manner, all
nodes should be able to act as routers for each other (see Figure 1.1). Routes are set up and maintained
by a routing protocol. MANET routing protocol design is a complex issue considering the possible rapidly
changing topology of such networks.

For route maintenance one has two main approaches in MANETs, reactive and proactive. Reactive
routing protocols set up traffic routes on-demand, whilst proactive protocols attempt to dynamically
maintain a full understanding of the topology.
1.1: A traditional base station scheme compared to an ad-hoc multi-hop network.

Infrastructure mode: The wireless network consists of at least one access point and a set of
wireless nodes. This configuration is called a Basic Service Set (385). An Extended service Set is a set of
two or more BSS (multiple cells).

Ad- hoc mode: This is a peer-to-peer mode. These configurations called Independent Basic Service
Set (1888), and are useful for establishing a network where nodes must be able to communicate directly
and without any centralized access point.

The Ad-hoc mode is obviously the mode to use when setting up a MANET, but it lacks one basic
requirement: multi hop. Traffic is only transmitted to neighbors within radio range when using the ad-
hoc mode, therefore there is a need for MANET routing protocols to set up and maintain traffic paths.
Node in an ad hoc network are responsible for dynamically discover which other nodes they can directly
communicate with.

1.2 Issues in Ad hoc Network


There are quite a few issues that need to be considered when it comes to ad hoc networking. A brief
overview of some of these follows:

Medium access scheme: The medium access protocol (MAP) needs to be designed to allow for certain
characteristics of wireless networks. Typical for wireless networks the nodes moves about, and this
leads to hidden terminal problem. Also, fair access to the medium, and minimize collisions, must be
taken into account. The MAP protocol should be able to adjust the power used for transmissions,
because, for an example, reducing transmission power at a node cause a decrease in interference at
neighboring nodes, and increase frequency reuse.
Routing Traditional routing protocols are not designed for rapid changing environments such as ad hoc
networks. Therefore, customized routing protocols are needed. Examples of such protocols are AODV
and OLSR. Routing is further discussed below.

Security Due to the fact that the nodes in a wireless ad hoc network communicate on a shared
medium, security becomes an important issue. This, in combination with the lack of any central
coordination, makes the network more vulnerable to attack than wired networks. There are different
ways of compromising wireless networks, including:

Denial of service An attacker makes services unavailable to others by keeping the service provider busy.

Resource consumption Battery power of critical nodes is depleted because of unnecessary processing
caused by an attacker, or the attacker causes buffer overflow which may lead to important data packets
being dropped.

Host impersonation as the name suggests, a compromised node may impersonate a host, and thereby
cause wrong route entries in routing tables elsewhere in the network.

Quality of service providing quality of service (Q08) in a wireless ad hoc network is a difficult task to
overcome. Nodes in such a network usually act both as clients and service providers, making, contrary to
most networks, the boundary between network and host less clear. Hence, to achieve QOS, a better
coordination between the nodes is required. Furthermore, wireless communication usually implies
limited resources, and this, in addition to the lack of central coordination, exacerbate the problem.

Parameters Different applications have different QOS parameter requirements. Whereas multimedia
applications require high bandwidth and low delay, availability is the primary requirement for search-
and rescue operation applications.

Routing to make sure that applications are provided with the services they request, QOS parameters
should be considered for route decisions. Throughput, packet loss rate, and reliability are examples of
such parameters.

1.3 Traditional IP routing


Routing is the primary function of IP. IP datagram are processed and forwarded by routers which relay
traffic through paths set up by various routing protocols. Routing in today fixed networks is based on
network aggregation combined with best matching. TCP/IP hosts use a routing table to maintain
knowledge about other IP networks and IP hosts.

Networks are identified by using an IP address and a subnet mask, and routes to single hosts are rarely
setup. When a packet is to be forwarded, the routing table is consulted and the packet is transmitted on
the interface registered with a route containing the best match for the destination. If no network
matches are found, a default route is used if one exists.
When configuring a network interface with an IP address, a route to the network the address is a
member of is usually registered on the interface automatically. This route is not set up with a gateway
(the next hop along the path to the host) since hosts with addresses within this network are assumed to
be reachable directly from this interface. This shows that the traditional IP routing maintains an idea of
all hosts within the same subnet being on the same link. This means that all hosts in a subnet are
available on a single one hop network segment, typically via routers or switches. When working on
wireless multi-hop networks this is not the case. One needs to redefine the idea of nodes being available
on the link. In MANETs nodes routes traffic by retransmitting packets on the interface it arrived. This
approach breaks with the wired on-link way of thinking.

MANET requires a different mindset when it comes to routing. Aggregation is not used in MANETs, all
routing is host based. This means that for all destinations within the MANET, a sender has a specific
route. In a wired network this is not necessary due to the fact that all nodes in the local network are
considered available on the link.

1.4The MANET IETF working group


The Internet Engineering Task Force (IETF) has set down a working group for MANET routing. The
purpose of this working group is to standardize [P routing protocol functionality suitable for wireless
routing application within both static and dynamic topologies. The fundamental design issues are that
the wireless link interfaces have some unique routing interface characteristics and that node topologies
within a wireless routing region may experience increased dynamics, due to motion or other factors.

A wide diversity of protocols have been proposed, but as of this writing, only three protocols are
accepted as experimental Request For Comments (RFC), namely Ad hoc On-Demand Distance Vector
(AODV) Optimized Link State Routing (OLSR)[10], and Topology Dissemination Based on Reverse-Path
Forwarding (TBRPF). The Dynamic Source Routing Protocol (DSR) is to be accepted as a RFC in a near
future.

1.5 MANET and Mobile IP


In the Internet community Mobile [P (MIP) is often mentioned when it comes to routing support for
mobile hosts. This is technology to support nomadic host roaming, where a roaming host may be
connected through various means to the Internet other than its well-known fixed-address domain space.
The host may be directly physically connected to the fixed network on a foreign subnet, or be connected
via a wireless link, dial-up line, etc. Supporting this form of host mobility requires address management,
protocol interoperability enhancements and the like, but core network functions such as hop-by-hop
routing still presently rely upon pre existing routing protocols operating within the fixed network. In
contrast, the goal of mobile ad hoc networking is to extend mobility into the realm of autonomous,
mobile, wireless domains, where a set of nodes, which may be combined routers and hosts them the
network routing infrastructure in an ad hoc fashion.

1.6 Radio technology


A node in wireless networks typically utilizes radio transmission. Infrared (IR) and Microwave (MW) are
two other transmission technologies, of which IEEE 802.11 supports the former one in addition to radio.

Wireless LANs use electromagnetic airwaves (radio or infrared) to communicate. The airwaves
propagate through space (even in a vacuum).

Different frequencies have different qualities: The higher the electromagnetic frequency, the more
information can be transmitted per second. However, lower frequencies are easy to generate, can travel
long distances, and can penetrate buildings easily. Radio waves operate on lower frequencies than
infrared waves, making it more suitable for most wireless networks.

Frequency hopping spread spectrum (FHSS) and direct sequence spread spectrum (DSSS) are the two
radio transmission schemes supported in IEEE 802.11. The idea behind FHSS is that the transmitter hops
from frequency to frequency hundreds of times per second. The hop pattern is known to both the
sender and receiver, and to other receivers not aware of the pattern, the transmission is hard to detect.
DSSS, on the other hand, does not hop from one frequency to another, but distributes the signal over
the entire frequency band at once.

Communication with 3 simultaneously, but cannot detect the interference.


1.7 Issues in wireless networks
There are a number of issues to consider when designing operations of wireless networks. The next
subsections describe a selected few of them.

Hidden terminals

As Illustrated in Figure 1.2, node A and node C are in range for communicating with node B, but not with
each other. Both may try to communicate with node B simultaneously, and might not detect any
interference on the wireless medium. Thus the signals collide at node B. which will not be able to
receive the transmissions from either node.

The typical solution for this so called Hidden terminal problem is that the nodes coordinate
transmissions themselves by asking and granting permission to send and receive packets. This scheme is
often called RTS/CTS (Request To Send/Clear to Send). The basic idea is to capture the channel by
notifying other nodes about an upcoming transmission. This is done by stimulating the receiving node to
outputting a short home so that nearby nodes can detect that a transmission is going to take place. The
nearby nodes are then expected to avoid transmitting for the duration of the upcoming (large) data
frame. The scheme is illustrated in Figure 4 on the following page.

Exposed Terminals

Consider a topology similar to the figure 1.3 but added a node D only reachable from node C.
Furthermore, suppose node B communicate with node C wants to transmit a packet to node D. During
the transmission between node B and the node D, even though both the transmission.

Figure 1.3 A request to send (RTS) and clear to send (CTS) scheme. First, A and C transmits a packet
simultaneously, causing a packet collision at B. Then A retransmits the packet before C does, thus
capturing the channel.
Chapter 2

MANET ROUTING
2.1 MANET
A mobile ad hoc network (MANET) consists of wireless nodes that communicate with each other in the
absence of a fixed wireless network infrastructure. Nodes cooperate to forward data packets with each
other, thus a node can communicate with another node by multi-hop. In the mobile ad hoc network,
node mobility causes unpredictable topology change, the design of quality of service (QOS) routing
protocol is more complicated than traditional networks. The ability to provide QOS support is
dependent on how well the channel resources are managed by the protocol at the MAC layer. MAC
protocols can be classified into two categories: contention-based MAC protocols and scheduled-based
MAC protocols.

2.2 MANET ROUTING PROTOCOL


The first pieces of literature we will discuss are a pair of survey papers by these two survey papers
gather together information on the wide variety of MANET routing protocols which researchers have
developed to meet the challenges of MANET routing, many of which feature different methods of
managing the issues associated with mobility. Reference performed an extensive research survey into
the available routing protocols and attempted to categories them by the features they exhibit and
provide details on the core protocols of each category. This is similar to work undertaken by who took a
similar approach in grouping routing protocols using the categories; geographical, multi-path,
hierarchical, geo-cast and power aware routing protocols. The two survey papers both find that every
protocol identified also fit into the core categories of; reactive, proactive or hybrid routing protocols in
additional to any other characteristics they exhibit.

Proactive Routing

Proactive protocols rely upon maintaining routing tables of known destinations, this reduces the amount
of control traffic overhead that proactive routing generates because packets are forwarded immediately
using known routes, however routing tables must be kept up-to-date; this uses memory and nodes
periodically send update messages to neighbors, even when no traffic is present, wasting bandwidth
[10]. Proactive routing is unsuitable for highly dynamic networks because routing tables must be
updated with each topology change, this leads to increased control message overheads which can
degrade network performance at high loads.

Reactive Routing

Reactive Protocols use a route discovery process to flood the network with route query requests when
a packet needs to be routed using source routing or distance vector routing.
Source routing uses data packet headers containing routing information meaning nodes don’t need
routing tables; however this has high network overhead. Distance vector routing uses next hop and
destination addresses to route packets, this requires nodes to store active routes information until no
longer required or an active route timeout occurs, this prevents stale routes.

Hybrid Routing

Hybrid protocols combine features from both reactive and proactive routing protocols, typically
attempting to exploit the reduced control traffic overhead from proactive systems whilst reducing the
route discovery delays of reactive systems by maintaining some form of routing table. The two survey
papers successfully collect information from a wide range of literature and provide detailed and
extensive reference material for attempting to deploy a MANET, both papers reach the conclusion that
no single MANET routing protocol is best for every situation meaning analysis of the network and
environmental requirements is essential for selecting an effective protocol. Whilst these papers contain
functionality details for many of the protocols available, performance information for the different
protocols is very limited and no details of any testing methodologies is provided, because of this the
validity of some claims made cannot be verified.

2.3 EARLY MANET ROUTING PROTOCOLS


The next piece of literature is a protocol performance comparison by which compares the proactive
Destination Sequenced Distance Vector (DSDV) protocol and the reactive Dynamic Source Routing (DSR)
protocol; these protocols were developed in 1994 and were amongst the earliest MANET routing
protocols identified using the previous survey papers.

Destination Sequenced Distance Vector (DSDV)

The proactive DSDV protocol was proposed by and is based upon the Bellman-Ford algorithm to
calculate the shortest number of hops to the destination. Each DSDV node maintains a routing table
which stores; destinations, next hop addresses and number of hops as well as sequence numbers;
routing table updates are sent periodically as incremental dumps limited to a size of 1 packet containing
only new information.

Dynamic Source Routing (DSR)

The reactive DSR Protocol was developed by , operation of the DSR protocol is broken into two stages;
route discovery phase and route maintenance phase, these phases are triggered on demand when a
packet needs routing. Route discovery phase floods the network with route requests if a suitable route
is not available in the route. DSR uses a source routing strategy to generate a complete route to the
destination, this will then be stored temporarily in nodes route cache.
Mobility Models

The performance of DSR and DSDV using simulations against 4 different mobility models; these are
mathematic models which control the motion of nodes around the simulation; this allows researchers to
measure the effect of mobility upon the routing protocols performance. Various mobility models are
used to simulate different situations such as high speed vehicular networks or lower mobility ad-hoc
conference users, however research by reveals that many studies perform protocol evaluation almost
exclusively using the random waypoint mobility model. This research is supported by findings from who
claim that the random waypoint model is the most widely used mobility model, however discrepancies
were identified between the models behavior and real world scenarios where users typically move in
groups, due to this the model may not be appropriate for exclusive testing.

What an ad-hoc routing protocol needs


 Multi-hop paths
 Self-starting
 Dynamic topology maintenance
 Loop-free
 Low consumption of memory, bandwidth
 Scalable to large node populations
 Localized effect of link breakage
 Minima lover head for data transmission
 Rapid convergence
 Multicast

Fig 2.1 shows how request are generates and get response in MANET
CHAPTER 3

INTRODUCTION TO AODV
Ad-hoc on-Demand Distance Vector

3.1 Introduction to AODV


AODV is an on-demand routing algorithm in that it determines a route to a destination only when a
node wants to send a packet to that destination. It is a relative of the Bellman-Ford distant vector
algorithm, but is adapted to work in a mobile environment. Routes are maintained as long as they are
needed by the source. AODV is capable of both uncast and multicast routing.

In AODV, every node maintains a table, containing information about which neighbor to send the
packets to in order to reach the destination.

Sequence numbers, which is one of the key features of AODV, ensures the freshness of routes.

3.1.1 AODV Control Messages types

RREQ - A route request message is transmitted by a node requiring a route to a node.


As an optimization AODV uses an expanding ring technique when flooding these messages. Every RREQ
carries a time to live (TTL) value that states for how many hops this message should be forwarded. This
value is set to a predefined value at the first transmission and increased at retransmissions.
Retransmissions occur if no replies are received.

Data packets waiting to be transmitted (i.e. the packets that initiated the RREQ) should be buffered
locally and transmitted by a FIFO principal when a route is set.

RREP- A route reply message is uncased back to the originator of a RREQ if the receiver is either the
node using the requested address, or it has a valid route to the requested address. The reason one can
uncast the message back is that every route forwarding a RREQ caches a route back to the originator.

RERR- Nodes monitor the link status of next hops in active routes. When a link breakage in an active
route is detected, a KERR message is used to notify other nodes of the loss of the link.
In order to enable this reporting mechanism, each node keeps a precursor list", containing the IP
Address fox each its neighbors that are likely to use it as a next hop towards each destination.

Figure 3.1 illustrates an AODV route lockup session. Node A wishes to initiate traffic to node J for winch
it has no route .A broadcasts a RREQ which is flooded to all nodes in the network.

When this request is

Sequence numbers

AODV differs from other on-demand routing protocols in that are uses sequence numbers to determine
an up-to date path to a destination. Every entry in the routing table is associated with a queue: number.
The sequence number act as a route timestamp, ensuring freshness of the route. Upon receiving a RRBQ
packet, an intermediate node compares its sequence number with the sequence number in the RREQ
packet if the sequence number already registered is greater than that m the pocket the existing route is
more up-to date.
Counting to infinity

The use of sequence numbers for every route also helps AODV avoid the count to infinity problem. The
core of the problem, as Tanenbaum put it, is that when X tells Y that it has a path somewhere, Y has no
way of knowing whether it itself is on the pat . So if Y detects that the link to, say, Z is down, but X says
it have a valid path, Y assumes X in fact does have a path, thus registering X as the next neighbor toward
Z. Then, if the path X assumed valid is through Y, X and Y will start updating each other in a loop.

3.4 Route discovery

Route discovery is initiated by issuing a RREQ message. The route is established when a RREP message is
received. However, multiple RREP messages may be received, each suggesting different routes to the
destination. The source only updates its path information if the RREP holds information about a more
up-to-date route than already registered. Thus, every incoming

RREP packet is examined to determine the freshness of the route suggested.

When a intermediate node receives either a RREQ or a RREP packet, information about the previous
node from which the packet was received is stored. This way, next time a packet following that route is
received; the node knows which node is the next hop toward the source or destination, depending on
which end node originated the packet.

The next subsection illustrates route discovery by providing an example.


Example of Route Discovery

Consider the ad hoc network of Figure 3.1. In this example, node A wants to send a packet to node F.
Suppose A has no table entry for F. A need to discover a route to F. In our example, we assume that
neither of the nodes knows where F is.

The discovery algorithm works like this:

Node A broadcasts a special ROUTE REQUEST packet on the network. The format of the ROUTE
REQUEST (RREQ) packet is shown in figure 3.1. Upon receiving the RREQ packet, B, C and E checks to see
if this RREQ packet is a duplicate, and discards it if it is. If not, they precede to checks their tables for a
valid route to F. If a valid route is found, a ROUTE REPLY (RREP) packet is sent back to the source. In case
of the destination sequence number in the table being less than the destination sequence number in the
RREQ, the route is not considered up-to date, and thus no RREP packet is sent. Since they don t know
where F is, they increment the RREQ packet s hop count, and rebroadcasts it. In order to construct a
route back to the source in case of a reply, they also make an entry in their reverse route tables
containing A s address.

Now, D and G receive the RREQ. These goes through the same process as B, C and E. Finally, the RREQ
reaches F, which builds a RRBP packet and uncast it back to A.

The Expanding Ring search


Since RREQ packets are flooded throughout the network, this algorithm does not scale well to large
networks. If the destination node is located relatively near the source, issuing a RREQ packet that
potentially pass through every node in the network is wasteful. The optimization AODV uses is the
expanding ring search algorithm, which works as follows. The source node searches successively larger
areas until the destination node is found. This is done by, for every RREQ retransmission until a route is
found, incrementing the time to live (TTL) value carried in every RREQ packet, thus expanding the search
ring in which the source is centered.
Link Breakage
When a link AODV breaks, a RERR message 1s propagated to both the end nodes. This implies that does
not repair broken links locally, but rather makes the end nodes discover alternate routes to the source.
Moreover, link breakage caused by the movement of end nodes also results in initialization of a route
discovery process.

When a RERR packet is received by intermediate nodes, their cached route entries are removed.

Advantages:

 Routes are established on demand and destination sequence numbers are used to find the
latest route to the destination.
 Lower delay for connection setup.

Disadvantage:

 AODV doesn’t t allow handling unidirectional links.


 Multiple Route Reply packets in response to a single Route Request packet can lead to heavy
control overhead.
 Periodic beaconing leads to unnecessary bandwidth consumption.
Chapter 4

INTRODUCTION TO OSLR
4.1 Optimized Link State Routing
The Optimized Link State Routing (OLSR) is a table-driven, proactive routing protocol developed for
MANETs. It is an optimization of pure link state protocols in that it reduces the size of control packet as
well as the number of control packets transmission required.

OLSR reduces the control traffic overhead by using Multipoint Relays (MPR), which is the key idea
behind OLSR. A MPR is a node's one-hop neighbor which has been chosen to forward packets. Instead of
pure flooding of the network packets are just forwarded by a node s MPRs. This delimits the network
overhead, thus being more efficient than pure link state routing protocols.

OLSR is well suited to large and dense mobile networks. Because of the use of MPRs, the larger and
more dense a network, the more optimized link state routing is achieved.

MPRs help providing the shortest path to a destination. The only requirement is that all MPRs declare
the link information for their MPR selectors (i.e., the nodes who has chosen them as (MPRs).

The network topology information is maintained by periodically exchange link state information.

If more reactivity to topological changes is required, the time interval for exchanging of link state
information can be reduced.

Diagram of OSLR flow DATA


4.2 Control messages
OLSR uses three kinds of control messages: HELLO, Topology Control (TC), and Multiple Interface
Declaration (MID).

A Hello message is sent periodically to all of a node s neighbors. Hello messages contain information
about a nodes neighbor, the nodes it has chosen as MPRs.

HELLO

TOPOLOGY CONTROL (TC)

Figure 4.1 the format of a OSLR HELLO PACKET

Every node periodically Hoods, using the multipoint relying mechanism, the network with a TC message.
This message contains the node s MPR Selector set.

A MID message is used for announcing that a node is running OLSR on more than one interface.

The MID message is flooded throughout the network by the MPRs.


4.3 Multipoint Relays
A node N selects an arbitrary subset of its 1-hop symmetric neighbors to forward data traffic. This
subset, referred to as MPR set, covers all the nodes that are two hops away. The MPR set is calculated
from information about the node s symmetric one hop and two hop neighbors. This information is
extracted from HELLO messages. Similar to the MPR set, amp Selectors set is maintained at each node.
AMP Selector set is the set of neighbors that have chosen the node as a MPR.

Upon receiving a packet, a node checks it's MPR selector set to see if the sender has chosen the node as
a MPR. If so, the packet is forwarded, else the packet is processed and discarded.

4.4 Selection of Multipoint Relay Nodes


The MPR set is chosen so that a minimum of one-hop symmetric neighbors are able to reach all the
symmetric two-hop neighbors. In order to calculate the MPR set, the node must have link state
information about all one hop and two-hop neighbors. This information is, as already mentioned,
gathered from HELLO messages. Only nodes with willingness different than WILL_NEVER may be
considered as MPR.

4.5 Neighbor discovery


As links in a ad hoc network can be either unidirectional or bidirectional, a protocol for determining the
link status is needed. In OLSR, HELLO messages serve, among others, this purpose. HELLO messages are
broadcasted periodically for neighbor sensing. When a node receives a

HELLO message in which it s address is found, it registers the link to the source node as symmetric.
As an example of how this protocol works, consider two nodes A and B which not yet have established
links with each other. First, A broadcasts an empty HELLO message. When B receives this message and
does not find its own address in it, it registers in the routing table that the link to A is asymmetric. Then
B broadcasts a HELLO message declaring A as an asymmetric neighbor. Upon receiving this message and
finding its own address in it, A registers the link to B as symmetric. A then broadcasts a HELLO message
declaring B as a symmetric neighbor, and B registers A as a symmetric neighbor upon reception of this
message.

Upon receiving a HELLO message in which the node s address is not contained, the node registers in the
routing table that the link to the source node is asymmetric. The node then sends a HELLO message
containing the source node s address, and when the source node receives this message and finds its
own address in it, it registers

4.6 Topology Information


Information about the network topology is extracted from topology control (TC) packets. These packets
contain the MPR Selector set of a node, and are broadcasted by every node in the network, both
periodically and when changes in the MPR Selector set is detected. The packets are flooded in the
network using the multipoint relaying mechanism. Every node in the network receives such TC packets,
from which they extract information to build a topology table.
4.7Route Calculation
The shortest path algorithm is used for route calculations, which is initiated when a change is detected
in either of the following: the link set, the neighbor set, the two-hop neighbor set, the topology set, or
the Multiple Interface Association Information Base.

To calculate the routing table, information is taken from the neighbor set and the topology set. The
calculation is an iterative process, in which route entries are added starting from one-hop neighbors,
increasing the hop count each time through.

A proactive approach to MANET routing seeks to maintain a constantly updated topology


understanding. The whole network should, in theory, be known to all nodes. This results in a constant
overhead of routing traffic, but no initial delay in communication.

The Optimized Link State routing (OLSR) is described in RFC3626. It is a table-driven active protocol. As
the name suggests, it uses the link-state scheme in an optimized manner to diffuse topology
information. In a classic link state algorithm, link-state information is flooded throughout the network.
OLSR uses this approach as well, but since the protocol runs in wireless multi-hop scenarios the message
flooding in OLSR is optimized to preserve bandwidth. The optimization is based on a technique called
Multi Point Relaying.

Being a table-driven protocol, OLSR Operation mainly consists of updating and maintaining information
in a variety of tables. The data in these tables is based on received control traffic, and control traffic is
generated based on information retrieved from these tables. The route calculation itself is also driven by
the tables.
Three basic types of control messages

HELLO. HIELLO messages are transmitted to all neighbors. These messages are used for neighbor sensing
and MPR calculation.

T C .Topology Control messages are the link state signaling done by OLSR. This messaging u optimized in
several ways using MPRs.

MID Multiple Interface Declaration messages are transmitted by nodes running OLSR on more than one
interface. These messages list all IP addresses used by a node.

Advantages:

 OLSR does not need central administrative system to handle its routing process
 The link is reliable for the control messages. Since the messages are sent periodically and
 The delivery does not have to be sequential.
 OLSR is suitable for high density networks.
 It does not allow long delays in the transmission of packets.

Disadvantages:

 OLSR protocol periodically sends the updated topology information throughout the entire
network.
 It allows high protocol bandwidth usage.
Chapter 5
OSLR CORE FUNCTIONALITY
Core Functionality of OLSR
The Optimized Link State Routing Protocol (OLSR) is developed for mobile ad hoc networks. The protocol
is documented in the experimental Request for Comment (RFC) 3626. OLSR is table driven and pro-
active and utilizes an optimization called Multipoint Relaying for control traffic flooding.

RFC3626 modularizes OLSR into core functionality, which is always required for the protocol to operate,
and a set of auxiliary functions. This chapter presents the core functionality of OLSR. The core
functionality specifies, in its own right, a protocol able to provide routing in a standalone MANET. Each
auxiliary function provides additional functionality, which may be applicable in specific scenarios. e.g., in
case a node is providing connectivity between the MANET and another routing domain. All auxiliary
functions are compatible, to the extent where any auxiliary function may be implemented with the core.
Furthermore, the protocol is said to allow heterogeneous nodes, i.e., nodes which implement different
subsets of the auxiliary functions, to coexist in the network.

As we shall later, this is not the case for all auxiliary functions.

It is important to understand that OLSR does not route traffic. It is not in any way responsible for the
actual process of routing traffic. OLSR could rather be described as route maintenance Protocol in that it
is responsible for maintaining the routing table used for routing packages. But such protocols are usually
referred to as routing protocols.

5.1 Node addressing


OLSR uses an IP address as the unique identifier of nodes in the network. As OLSR is designed to be able
to operate on nodes using multiple communication interfaces, every node must choose one IP address
that is set to be its main address.

OLSR can be used both with 1 Version 4(1Pv4) and version 6(va6). In an OLSR context the differences
between IPv4 and IPv6 is the size of the IP addresses transmitted in control messages, the minimum size
of messages and the address to use as destination for control traffic.
Information repositories

As a derivate of the classical link-state algorithm, OLSR maintains state by keeping a variety of databases
of information. These information repositories are updated upon processing received control messages
and the information stored is used when generating such messages. Here follows a brief look at the
different information repositories used in core OLSR.

Multiple Interface Association Information Base

This dataset contains information about nodes using more than one communication interface. All
interface addresses of such nodes are stored here.

Link Set

This repository is maintained to calculate the state of links to neighbors. This is the only database that
operates on non-main-addresses as it works on specific interface-to-interface links.

Neighbor Set

All registered one-hop neighbors are recorded here. The data is dynamically updated based on
information in the link set. Both symmetric and asymmetric neighbors are registered.

2-hop Neighbor Set

All nodes, not including the local node, that can be reached via an one hop neighbor IS registered here.
Notice that the two hop neighbor set can contain nodes registered in the neighbor set as well.

MPR Set

All MPRs selected by the local node is registered 111 this repository. The MPR concept is explained in
section 5.4.

MPR Selector Set

All neighbors that have selected this node as a MPR are recorded in this repository.
Topology Information Base

This repository contains information of all link-state information received from nodes in the OLSR
muting domain.

Duplicate set

This database contains information about recently processed and forwarded messages.

5.2.1 Timeouts

Most information kept in these repositories is registered with a timeout. This is a value indicating for
how long the registered information is to be considered valid. This value is set according to a validity
time fetched from the message from which the data was last updated. The use of such a distributed
validity time allows for individual message emission intervals for all nodes in the network. All database
entries are removed when no longer valid according to the registered timeout. Such entries are said to
be timed out.

5.3 Control traffic

All OLSR control traffic is to be transmitted over UDP on port 698. This port is assigned to OLSR by the
Internet Assigned Numbers Authority (IANA). The RFC states that this traffic is to be broadcasted when
using IPv4, but no broadcast address is specified. When using IPv6 broadcast addresses does not exist,
so even though it is not specified in the RFC. It is implicit understood that one must use a multicast
address in this case.

5.3.1 Packet format

All OLSR traffic is sent in OLSR packets. These packets consist of a OLSR packet header and a body as
displayed in fig 5.1.
The fields in OLSR packet header are:

5.1: The generic OLSR packet.

 Packet Length - The length in bytes of the entire packet, including the header.
 Packet Sequence Number - A sequence numberincrementedby one each time a new OLSR
message is transmitted by this host. A separate Packet Sequence Number is maintained for each
interface so that packets transmitted over an interface are sequentially enumerated.

An OLSR packet body consists of one or more OLSR messages. OLSR messages use a header as Shown in
fig 5.1. All OLSR messages must respect this header. The fields in the header are:

 Message type - An integer identifying the type of this message. Message types of 0-127 are
reserved by OLSR while the 128-255 space is considered private" and can be used for custom
extensions of the protocol.
 V Time - This field indicates for how long alter reception a node will consider the information
contained in the message as valid. The time interval is represented in a mantissa-exponent
format.
 Message Size - The size of this message, including message header, counted in bytes.
 Originator Address - Main address of the originator of this message.
 Time To Live - The maximum number of hops this message can be forwarded. Using this held
one can control the radius of flooding.

 Hop Count - The number of times the message has been forwarded.

 Message Sequence Number - A sequence number in cemented by one each time a new OLSR
packet is transmitted by this host.

5.3.2 Message types

The core functionality of OLSR defines tree message types, which will all be described in detail later. All
core functionality of OLSR is based on processing and generation of these messages. However, the OLSR
protocol packet format allows for a wide variety of custom packets to be transmitted and flooded to the
needs of the designer.

OLSR will forward unknown packet types according to the default forwarding rule as explained later. The
MPR optimization used in OLSR makes this possibility for message flooding a great asset to anyone in
need of net wide broadcasting of traffic in the ad hoc network.

5.2: Flooding a packet in a wireless multi-hop network. The arrows show all Transmissions.
5.4 Multipoint Relaying
OSLR uses flooding of packets to diffuse topology information throughout the network. To avoid loops, a
sequence is usually carried in such packets. This sequence number is registered by receiving nodes 0
assure that a packet is only retransmitted once. If a node receives a packet with a sequence number
lower or equal to the last registered retransmitted packet from the sender, the packet is n0t
retransmitted. 0n wired networks other optimizations are usually added such as no retransmission 0n
the interface on which a packet arrived.

On a wireless multi-hop network however, it is essential that nodes retransmits packets on the same
interface that it arrived, since this is the very nature of wireless multi-hop networks. This again causes
every retransmitted to actually receive a duplicate Packet from every symmetric neighbor that
retransmits the packet. A wireless flooding scenario is depicted in 3.2. One can see that every
transmission leads to a reception of the same packet. The originator of the flood could be any node in
the figure.

The number of retransmissions using traditional flooding is n l where n is the number of nodes in the
network. In our case (figure 5.2) it will be 24.

This flooding technique can clearly benefit from some sort of optimization.

5.4.1 Multipoint relaying


The concept of multipoint relaying is to reduce the number of duplicate retransmissions while
forwarding a broadcast packet. This technique restricts the set of nodes retransmitting a packet from all
nodes, to a subset of all nodes. The size of this subset depends on the topology of the network. This is
achieved by selecting neighbors as Multipoint relays (MPRs). Every node calculates its own set of MPRs
as a subset of its symmetric neighbor nodes chosen so that all 2 hop neighbors can be reached through a
MPR. This means that for every node n in the network that can be reached from the local node by at
minimum two symmetric hops, there must exists a MPR In so that n has a symmetric link to m and m is a
symmetric neighbor of the local node. In the scenario illustrated in figure 3.6, node selects the black
nodes as MPRs. This way all two hop nodes can be reached through a MPR.

Node will not retransmit traffic from that is to be flooded.


FIGURE 5.3 Floooding a packet in a wireless multihop network from the center node using MPRs
(BLACK). The arrows show all transmission.

FIGURE 5.4 Flooding a packet in a wireless multihop network. The arrows show the way information
is passed not all transmission.

FIGURE 5.5: Flooding a packet in a wireless multihop network from the center node using MPRs (BLACK).
The arrows show the way information is passed, not all transmissions. OLSR lets nodes announce their
own willingness to act as MPRs for neighbors. 8 levels of willingness are defined from the lowest (0),
which indicates that this node must never be chosen as a MFR. to the highest (7), which Mates that this
node should always be chosen as a MPR. The willingness is spread through HELLO messages and this
information must be considered when calculating MPRs.

Finding the optimal MPR set has been proved to be a NP -complete problem in RFC 3626 propose a
rather simple heuristic for MPR calculation. The MPR scheme has been further studied and analyzed in
amongst others, and in this thesis the MPR technique is not further analyzed.

5.4.2 Forwarding OLSR traffic


Relaying of messages is what makes flooding in MANETS possible. OLSR specifies a default forwarding
algorithm that uses the MPR information to flood packets. One is however free to make one own rules
for custom forwarding of custom messages. But all messages received that carries a type not known by
the local node, must be forwarded according to the default forwarding algorithm. The algorithm can be
outlined as:

1. If the link on which the message arrived is not considered symmetric, the message is silently
discarded. To check the link status the link set is queried.

2. If the TTL carried in the message header is 0, the message is silently discarded.

3. If this message has already been forwarded the message is discarded. To check for already forwarded
messages the duplicate set is queried.

4. If the last hop sender of the message, not necessarily the originator, has chosen this node as a MPR,
then the message is forwarded. If not, the message is discarded. To check this MPR selector set is
queried.

5. If the message is to be forwarded, the 'ITL of the message is reduced by one and the hop-count of the
message is increased by one before broadcasting the message on all interfaces.
FIGURE 5.6 Node A has selected the BLACK nodes its MPRs.

The fact that all received unknown message types are forwarded using this approach makes flooding of
special message-types possible even if these message-types are only known to a subset of the nodes.

Figures 5.4 and 5.5 shows the paths information is passed when being spread, first using regular
flooding, then using MPR flooding. The number of retransmissions in a MPR scenario highly depends on
the network topology and the MPR calculation algorithm. Using the same topology as in fig 5.2, a
possible MPR calculation could lead to the black nodes in fig 5.3 being chosen as MPRs by the center
node. As one can see, if the center node is to flood a message throughout the network, 4
retransmissions are done using MPR as opposed to 24 using traditional flooding.

The duplicate set

To be able to check if a message has already been retransmitted, a cache of recently processed and
forwarded messages is maintained. The data stored is the minimum needed to identify the message.

This means that the actual message content is not stored, but rather just originator address, message
type and sequence number. This data is cached for a constant time of suggested to be 30seconds in the
RFC.

Every received message that is processed by the local node is registered in the duplicate set. If the
message is forwarded, the duplicate-entry representing this message is updated accordingly; registering
on what interfaces the message has been forwarded. Based on querying the duplicate set, a node can
then keep interface basis.
Forward jitter

To avoid radio collisions due to synchronized forwarding, a jitter is introduced to the message
forwarding. This is a random small time interval for which the message is to be cached in the node more
forwarding it.

When using forwarding jitter, piggybacking of messages will often occur since multiple message that are
to be forwarded might arrive within the buffer period. When this happens, messages are stacked within
the same OLSR packet.

5.4.3 Link set optimization


Due to the nature of the MPR selection, only nodes which are chosen as MPRs by one or more
neighbors, needs to declare their link-state. In fact, these nodes need only declare the MPR selectors in
the link state messages. When this information is flooded to all nodes in the MANET, all nodes will have
enough.

An OLSR routed network. The gray nodes are chosen as MPRs by one or more neighbor.

Information to calculate shortest path routes to all hosts. The default OLSR setting is that a node only
floods link-state messages if it is chosen as MPR by at least one neighbor and it only announces its MPR
selectors in these messages. In a topology as illustrated in figure 5.7 only throes nodes selected as MPRs
(gray nodes) by one or more neighbors will transmit link-state messages.

You might also like