SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 2, Issue 4 (July-Aug 2014), PP. 05-08
5 | P a g e
COMPARISON OF OLSR AND ENERGY
CONSERVED OLSR
Mrs. Ladkat Shital Anandrao, Prof. Jakhade Yashashree Amey
Department Of Information Technology
Sinhgad College Of Engineering, Pune.
Abstractโ€” An ad hoc wireless network contains mobile
networks which creates an underlying architecture for
communication without the help of traditional fixed-position
routers. Nevertheless, the architecture must maintain
communication routes although the hosts are mobile and they
have limited transmission range. There are different protocols for
handling the routing in the mobile environment. This paper will
focus on two well know algorithms: Optimized Link State
Routing Protocol and Optimized Linked State Routing Protocol
for Energy Consumption.
Key wordsโ€” EOLSR, OLSR, Routing.
I.INTRODUCTION
Wireless communication technology is growing daily; with
such growth sooner it would not be physically possible to have
a fixed architecture for this kind of network. Ad hoc wireless
network must be capable to self-organize and self-configure
due to the fact that the mobile structure is varying all the time.
Mobile hosts have a restricted range and sending the message
to another host, which is not in the senderโ€™s host transmission
range, must be forwarded through the network using other
hosts which will be used as routers for transporting the
message throughout the network. The mobile host must use
broadcast for sending messages and should be in fast mode for
message throughout the network. The mobile host must use
broadcast for sending messages and should be in fast mode for
accepting any messages that it receives. In the ad hoc network
there can be unidirectional hosts that can transmit only to the
one direction, so that the communication is not bi-directional as
in the usual communication systems. [4, 5, 8]
The routing protocols for ad hoc wireless network should
be able to handle a large number of hosts with limited
resources, such as bandwidth and energy. The main inspiration
for the routing protocols is that they must also deal with host
movability, meaning that hosts can appear and disappear in
various places. Therefore, all hosts of the ad hoc network
behave as routers and must play a role in the route discovery
and maintenance of the routes to the other hosts. For ad hoc
routing protocols it is important to minimize routing messages
overhead in spite of the increasing number of hosts and their
mobility. Maintaining the routing table small is another
important issue, because the increase of the routing table will
have an impact on the control packets transmitted in the
network and this in turn will affect large link overheads. [4, 5,
8].
Routing protocols are partitioned into two categories based
on how and when routes are found, but both find the shortest
path to the destination. Proactive routing protocols are table-
driven protocols, they always maintain current up-to-date
routing information by transmitting control messages
frequently between the hosts which alter their routing tables.
When there are alterations in the structure then the updates are
propagated throughout the network. The proactive routing
protocols consist of link-state routing algorithms which
frequently flood the link information about its neighbors. Other
routing protocols are on-demand routing protocols, in other
words reactive, ones which establish routes when they are
needed by the source host and these routes are maintained
while they are required. When nodes exchange vectors of
information, each host alter own routing information when
needed. The ad hoc routing protocols are usually classified as a
pure proactive or a pure reactive protocol, but there are also
hybrid protocols.
Fig. 1 Routing in wireless sensor network [1]
II.OPTIMIZED LINK STATE ROUTING PROTOCOL (OLSR)
A. Introduction
Optimized Link State Protocol (OLSR) is a proactive
routing protocol, so the routes are always instantly accessible
when needed. OLSR is optimization version of a pure link state
protocol. So the topological changes cause the flooding of the
topological information to all accessible hosts in the network.
The idea of MPR is to minimize flooding of broadcasts by
minimizing the same broadcast in some regions in the network.
Another minimization is to provide the shortest path.
Minimizing the time interval for the control messages
transmission can bring more reactivity to the topological
changes. [3, 4, 5, 10, 11, 12, 7] OLSR proposes two kinds of
the control messages: Hello and Topology Control (TC). Hello
messages served for finding the information about the link
status and the hostโ€™s neighbors. With the Hello message the
Multipoint Relay (MPR) Selector set is built which describes
which neighbors has selected this host to act as MPR and from
this information the host can calculate its own set of the MPRs.
The Hello messages are transmitted only one hop away but the
TC messages are broadcasted throughout the complete
network. TC messages are utilized for broadcasting information
about own advertised neighbors which includes at least the
MPR Selector list. The TC messages are broadcasted
frequently and only the MPR hosts can forward the TC
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 2, Issue 4 (July-Aug 2014), PP. 05-08
6 | P a g e
messages [2, 3, 10, 11, 12, 7]. There is also Multiple Interface
Declaration (MID) messages which are utilized for informing
other host that the announcing host can have multiple OLSR
interface addresses. The MID message is broadcasted
throughout the complete network only by MPRs. There is also
a โ€œHost and Network Associationโ€ (HNA) message which
serves the external routing information by giving the possibility
for routing to the external addresses. The HNA message gives
information about the network- and the netmask addresses, so
that OLSR host can consider that the reporting host can act as a
gateway to the reporting set of addresses. The HNA is
considered as a generalized version of the TC message with
only difference that the TC message can inform about path
cancelling while HNA message information is eliminated only
after expiration time.
B. Routing
The link in the ad hoc network can be either unidirectional
or bidirectional so the host must aware of this information
about the neighbors. The Hello messages are broadcasted
frequently for the neighbor sensing. The Hello messages are
only broadcasted one hop away so that they are not forwarded
afterwards. When the first host accept the Hello message from
the second host, it sets the second host status to asymmetric in
the routing table. When the first host sends a Hello message
and it understands that, it has the link to the second host as
asymmetric, the second host set first host status to symmetric in
own routing table. Finally, when second host transmit again
Hello message, where the status of the link for the first host is
indicated as symmetric, then first host changes the status from
asymmetric to symmetric. In the end both hosts understand that
their neighbor is alive and the corresponding link is
bidirectional. [2, 8, 11, 9] The Hello messages are utilized for
getting the information about local links and neighbors. The
Hello messages periodic broadcasting is used for link sensing,
neighborโ€™s discovery and MPR selection method. Hello
message contains: information how often the host transmits
Hello messages, willingness of host to act as a Multipoint
Relay, and information about its neighbor. Information about
the neighbors contains: interface address, link type and
neighbor type. The link type shows that the link is symmetric,
asymmetric or simply lost. The neighbor type is just symmetric,
MPR or not a neighbor. The MPR type shows that the link to
the neighbor is symmetric and that this host has chosen it as
Multipoint Relay. [2]
The Multipoint Relays (MPR) is the main idea behind the
OLSR protocol to minimize the information exchange
overhead. Instead of pure flooding the OLSR uses MPR to
minimize the number of the host which broadcasts the
information throughout the network. The MPR is a hostโ€™s one
hop neighbor which may forward its message packets. The
MPR set of host is kept small in order for the protocol to be
efficient. In OLSR only the MPRs can forward the data
throughout the complete network [2]. Each host must have the
information about the symmetric one hop and two hop
neighbors to calculate the optimal MPR set. Information about
the neighbors is taken from the Hello messages. The two hop
neighbors are found from the Hello message because each
Hello message contains all the hostsโ€™ neighbors. Selecting the
minimum number of the one hop neighbors which covers all
the two hop neighbors is the aim of the MPR selection
algorithm. Each host has the Multipoint Relay Selector set,
shows which hosts has chosen the current host to act as a MPR
[9, 10, 12, 7]. When the host gets a new broadcast message,
which is require to be scatter throughout the network and the
messageโ€™s sender interface address is in the MPR Selector set,
then the host must convey the message. Due to the possible
alteration in the ad hoc network, the MPR Selectors sets are
updated repeatedly using Hello messages. [2]
The algorithm constructs the MPR set which contains less
number of the one hop symmetric neighbors from which it is
possible to reach all the symmetrical strict two hop neighbors.
The host must have the information about one and two hop
symmetric neighbors to start the needed calculation for the
MPR set. All the transfer of information is broadcasted using
Hello messages. The neighbors which have status of
willingness different than WILL_NEVER in the Hello message
can be chosen to act as MPR. The neighbor must be symmetric
in order to become an MPR.
In order to exchange the topological information and build
the topology information base the host that were selected as
MPR need to sent the topology control (TC) message. The TC
messages are broadcasted throughout the network and only
MPR are allowed to forward TC messages. The TC messages
are generated and broadcasted periodically in the network. [2]
The TC message is sent by a host in order to advertise own
links in the network. The host must send at least the links of its
MPR selector set. The TC message includes the own set of
advertised links and the sequence number of each message. The
sequence number is used to avoid loops of the messages and
for indicating the freshness of the message, so if the host gets a
message with the smaller sequence number it must discard the
message without any updates. The host must increment the
sequence number when the links are removed from the TC
message and also it should increment the sequence number
when the links are added to the message. The sequence
numbers are wrapped around. When the hosts advertised links
set becomes empty, it should still send empty TC messages for
specified amount of time, in order to invalidate previous TC
messages. This should stop sending the TC messages until it
has again some information to send. [2, 8, 11, 9] The size of the
TC message can be quite big, so the TC message can be sent in
parts, but then the receiver must combine all parts during some
specified amount of time. Host can increase its transmission
rate to become more sensible to the possible link failures.
When the change in the MPR Selector set is noticed, it
indicates that the link failure has happened and the host must
transmit the new TC message as soon as possible.[2]
The host maintains the routing table, the routing table
entries have following information: destination address, next
address, number of hops to the destination and local interface
address. Next address indicates the next hop host. The
information is got from the topological set (from the TC
messages) and from the local link information base (from the
Hello messages). So if any changes occur in these sets, then the
routing table is recalculated. Because this is proactive protocol
then the routing table must have routes for all available hosts in
the network. The information about broken links or partially
known links is not stored in the routing table. [2, 8, 3] The
routing table is changed if the changes occur in the following
cases: neighbor link appear or disappear, two hops neighbor is
created or removed, topological link is appeared or lost or when
the multiple interface association information changes. But the
update of this information does not lead to the sending of the
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 2, Issue 4 (July-Aug 2014), PP. 05-08
7 | P a g e
messages into the network. For finding the routes for the
routing table entry the shortest path algorithm is used. [2, 8, 3]
III.OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR
ENERGY CONSUMPTION
In this section, the modification steps for OLSR protocol
are discussed. The modified protocol is named as EOLSR. The
OLSR protocol is modified in two processes i.e. while selecting
MPR nodes and while calculating route for forwarding data [6].
A. MPR Selection
The existing OLSR consumes more energy in energy
constrained applications which results in less network lifetime.
To improve network lifetime as well as energy efficiency
OLSR is modified by using two approaches as below;
1. By setting threshold for Residual Energy
2. By setting threshold for Energy Consumption
For MPR selection we have decided a threshold value,
which is one third of initial energy for both residual energy and
energy consumption approach.
1. If the residual energy of node is less than threshold
value then node having LOW-MPRWILL while
residual energy of node is more than threshold value
then node having HIGH-MPR-WILL.
2. If the energy consumed by node is less than threshold
value then node having HIGHMPR-WILL while
consumed energy of node is more than threshold value
then node having LOW-MPR-WILL.
Figure 2. Flow Chart for residual Energy and Energy
Consumption Approach
B. New HELLO and TC packet format
HELLO packets are used for selection of MPR nodes. For
selection of MPR each node having,
1. Highest residual energy
2. Lowest energy consumption
There is requirement to change residual energy of each
node at regular interval. For this purpose the value of residual
energy and energy consumed by node is included in HELLO
packet. The reserved part in OLSR HELLO packet format is
assigned to residual energy in EOLSR-RE and energy
consumption in EOLSR-EC. Each node sends HELLO packet
with entry for current residual energy and depending on
threshold value set it selects MPR node.
The reserved part in TC packet is modified with entry for
residual energy and energy consumption of node .The TC
packets are transmitted to entire network with the help of MPR
nodes. The TC packets are used to disseminate topology
information over complete network. The modified TC packet
format forwards residual energy of each node and energy
consumed by each node over complete network. After knowing
topology information for each node in network the route
computation is performed.
No. of
Connection
Energy Consumption
EOLSR-
RE
OLSR EOLSR-
EC
16 10.3874 10.5285 10.4421
18 9.98939 12.5364 10.2235
20 10.7527 13.9693 11.9932
22 13.5147 15.7888 14.3235
24 15.6768 17.9791 16.5433
Table 1.Impact of variation of number of connections on
Energy Consumption
Figure 3: Impact of Variation of number of Nodes on
Energy Consumption
IV.CONCLUSION
In this paper, we compared EOLSR-RE and EOLSR-EC
over OLSR. From this discussion, we can say that EOLSR-RE
is best protocol in terms of energy efficiency.
The average energy consumption increases with node
density, node speed. Control overheads are directly
proportional to node density while it remains constant for
alteration of node speed. EOLSR-RE is suitable option in
military applications, disaster recovery areas and remote areas
such as forests where energy saving is important requirement.
REFERENCES
[1] Michael Chien-Chun Hung, Kate Ching-Ju Lin, Cheng-Fu Chou
and Chih-Cheng Hsu Article โ€œEFFORT: energy-efficient
opportunistic routing technology in wireless sensor networks
โ€œ(pages 760โ€“773)first published online: 30 MAY 2011 | DOI:
10.1002/wcm.1140
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 2, Issue 4 (July-Aug 2014), PP. 05-08
8 | P a g e
[2] T. Clausen and P. Jacquet โ€œOptimized Link State Routing
Protocol (OLSR).โ€ RFC 3626, IETF Network Working Group,
October 2003.
[3] Ying Ge, Thomas Kunz and Louise Lamont โ€œQuality of Service
Routing in Ad-Hoc Networks Using OLSR.โ€ Proceeding of the
36th Hawaii International Conference on System
Science(HICSSโ€™03)
[4] Xiaoyan Hong, Kaixin Xu and Mario Gerla โ€œScalable Routing
Protocols for mobile Ad Hoc Networks.โ€ Computer Science
Department, University of California, Los Angeles, August
2002.
[5] Koey Huishan, Chua Huimin and Koh Yeow Nam โ€œRouting
Protocols in Ad hocWireless Networks.โ€ National University of
Singapore.
[6] Mayur Tokekar and Radhika D. Joshi, โ€œEnhancement of
Optimized Linked State Routing Protocol for Energy
Conservationโ€, CCSEA 2011, CS & IT 02, pp. 305โ€“319, 2011.
[7] P.Jacquet, A. Laouiti, P. Minet and L. Viennot โ€œPerformance
Analysis of OLSR Multipoint Relay Flooding in Two Ad Hoc
Wireless Network Models.โ€ Research Report-4260. INRIA,
September 2001. RSRCP journal special issue on Mobility and
Internet.
[8] P.Jacquet, P. Mรผhlethaler, T Clausen, A. Laouiti, A. Qayyum
and L. Viennot โ€œOptimized Link State Protocol for Ad Hoc
Networks.โ€ IEEE INMIC Pakistan 2001.
[9] A. Laouti, P. Mรผhlethaler, A. Najid and E. Plakoo โ€œSimulation
Results of the OLSR Routing Protocol for Wireless Network.โ€
1st Mediterranean Ad-Hoc Networks workshop (Med-Hoc-Net).
Sardegna, Italy 2002.
[10] P. Jacquet, A. Laouiti, P. Minet and L. Viennot โ€œPerformance of
multipoint relaying in ad hoc mobile routing protocols.โ€
Networking 2002. ise(Italy)2002.
[11] T.H. Clausen, G. Hansen, L.Christensen and G. Behrmann โ€œThe
Optimized Link State Routing Protocol, Evaluation through
Experiments and Simulation.โ€ IEEE Symposium on "Wireless
Personal Mobile Communications". September 2001.
[12] A. Laouiti, A. Qayyum and L. Viennot โ€œMultipoint Relaying for
Flooding Broadcast Messages in Mobile Wireless Networks.โ€
35th Annual Hawaii International Conference on System
Sciences (HICSSโ€™2002).

More Related Content

What's hot

Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
IJERA Editor
ย 

What's hot (19)

E010322531
E010322531E010322531
E010322531
ย 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
ย 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ย 
The Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksThe Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless Networks
ย 
Hd3312521256
Hd3312521256Hd3312521256
Hd3312521256
ย 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
ย 
A study on performance comparison of dymo with aodv and dsr
A study on performance comparison of dymo with aodv and dsrA study on performance comparison of dymo with aodv and dsr
A study on performance comparison of dymo with aodv and dsr
ย 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
ย 
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETPerformance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
ย 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
ย 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
ย 
1.a distributed three hop routing protocol to increase the
1.a distributed three hop routing protocol to increase the1.a distributed three hop routing protocol to increase the
1.a distributed three hop routing protocol to increase the
ย 
ICICCE0367
ICICCE0367ICICCE0367
ICICCE0367
ย 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
ย 
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksPrediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
ย 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocol
ย 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
ย 
Energy Consumption of Intermediate node in AODV
Energy Consumption of Intermediate node in AODVEnergy Consumption of Intermediate node in AODV
Energy Consumption of Intermediate node in AODV
ย 
G343741
G343741G343741
G343741
ย 

Viewers also liked

FACTORS AFFECTING PROJECT SUSTAINABILITY BEYOND DONORโ€™S SUPPORT. THE CASE OF ...
FACTORS AFFECTING PROJECT SUSTAINABILITY BEYOND DONORโ€™S SUPPORT. THE CASE OF ...FACTORS AFFECTING PROJECT SUSTAINABILITY BEYOND DONORโ€™S SUPPORT. THE CASE OF ...
FACTORS AFFECTING PROJECT SUSTAINABILITY BEYOND DONORโ€™S SUPPORT. THE CASE OF ...
International Journal of Technical Research & Application
ย 
PHYSICO-CHEMICAL AND BACTERIOLOGICAL ASSESSMENT OF RIVER MUDZIRA WATER IN MUB...
PHYSICO-CHEMICAL AND BACTERIOLOGICAL ASSESSMENT OF RIVER MUDZIRA WATER IN MUB...PHYSICO-CHEMICAL AND BACTERIOLOGICAL ASSESSMENT OF RIVER MUDZIRA WATER IN MUB...
PHYSICO-CHEMICAL AND BACTERIOLOGICAL ASSESSMENT OF RIVER MUDZIRA WATER IN MUB...
International Journal of Technical Research & Application
ย 
UNDERSTANDING ENTREPRENEURSHIP: IMPACT OF OVERCONFIDENCE ON ENTREPRENEURSHIP
UNDERSTANDING ENTREPRENEURSHIP: IMPACT OF OVERCONFIDENCE ON ENTREPRENEURSHIPUNDERSTANDING ENTREPRENEURSHIP: IMPACT OF OVERCONFIDENCE ON ENTREPRENEURSHIP
UNDERSTANDING ENTREPRENEURSHIP: IMPACT OF OVERCONFIDENCE ON ENTREPRENEURSHIP
International Journal of Technical Research & Application
ย 
OXIDATIVE STRESS AND NITRIC OXIDE: A SIGNIFICANT MARKER IN CORONARY ARTERY DI...
OXIDATIVE STRESS AND NITRIC OXIDE: A SIGNIFICANT MARKER IN CORONARY ARTERY DI...OXIDATIVE STRESS AND NITRIC OXIDE: A SIGNIFICANT MARKER IN CORONARY ARTERY DI...
OXIDATIVE STRESS AND NITRIC OXIDE: A SIGNIFICANT MARKER IN CORONARY ARTERY DI...
International Journal of Technical Research & Application
ย 
COMPARATIVE STUDY OF BELL PEPPER ON THE ASPECTS OF THEIR APPROXIMATE ANALYSIS...
COMPARATIVE STUDY OF BELL PEPPER ON THE ASPECTS OF THEIR APPROXIMATE ANALYSIS...COMPARATIVE STUDY OF BELL PEPPER ON THE ASPECTS OF THEIR APPROXIMATE ANALYSIS...
COMPARATIVE STUDY OF BELL PEPPER ON THE ASPECTS OF THEIR APPROXIMATE ANALYSIS...
International Journal of Technical Research & Application
ย 
TRAFFIC NOISE ATTENUATION IN SELFPROTECTED BUILDING ENVELOPS
TRAFFIC NOISE ATTENUATION IN SELFPROTECTED BUILDING ENVELOPSTRAFFIC NOISE ATTENUATION IN SELFPROTECTED BUILDING ENVELOPS
TRAFFIC NOISE ATTENUATION IN SELFPROTECTED BUILDING ENVELOPS
International Journal of Technical Research & Application
ย 
EFFECT OF DIFFERENT CONCENTRATIONS OF AUXINS AND COMBINATION WITH KINETIN ON ...
EFFECT OF DIFFERENT CONCENTRATIONS OF AUXINS AND COMBINATION WITH KINETIN ON ...EFFECT OF DIFFERENT CONCENTRATIONS OF AUXINS AND COMBINATION WITH KINETIN ON ...
EFFECT OF DIFFERENT CONCENTRATIONS OF AUXINS AND COMBINATION WITH KINETIN ON ...
International Journal of Technical Research & Application
ย 

Viewers also liked (20)

MAPPING REMOTE PLANTS THROUGH REMOTE SENSING TECHNOLOGY AND GIS
MAPPING REMOTE PLANTS THROUGH REMOTE SENSING TECHNOLOGY AND GISMAPPING REMOTE PLANTS THROUGH REMOTE SENSING TECHNOLOGY AND GIS
MAPPING REMOTE PLANTS THROUGH REMOTE SENSING TECHNOLOGY AND GIS
ย 
IMPROVEMENT OF SUPPLY CHAIN MANAGEMENT BY MATHEMATICAL PROGRAMMING APPROACH
IMPROVEMENT OF SUPPLY CHAIN MANAGEMENT BY MATHEMATICAL PROGRAMMING APPROACHIMPROVEMENT OF SUPPLY CHAIN MANAGEMENT BY MATHEMATICAL PROGRAMMING APPROACH
IMPROVEMENT OF SUPPLY CHAIN MANAGEMENT BY MATHEMATICAL PROGRAMMING APPROACH
ย 
FACTORS AFFECTING PROJECT SUSTAINABILITY BEYOND DONORโ€™S SUPPORT. THE CASE OF ...
FACTORS AFFECTING PROJECT SUSTAINABILITY BEYOND DONORโ€™S SUPPORT. THE CASE OF ...FACTORS AFFECTING PROJECT SUSTAINABILITY BEYOND DONORโ€™S SUPPORT. THE CASE OF ...
FACTORS AFFECTING PROJECT SUSTAINABILITY BEYOND DONORโ€™S SUPPORT. THE CASE OF ...
ย 
PHYSICO-CHEMICAL AND BACTERIOLOGICAL ASSESSMENT OF RIVER MUDZIRA WATER IN MUB...
PHYSICO-CHEMICAL AND BACTERIOLOGICAL ASSESSMENT OF RIVER MUDZIRA WATER IN MUB...PHYSICO-CHEMICAL AND BACTERIOLOGICAL ASSESSMENT OF RIVER MUDZIRA WATER IN MUB...
PHYSICO-CHEMICAL AND BACTERIOLOGICAL ASSESSMENT OF RIVER MUDZIRA WATER IN MUB...
ย 
Ijtra150317
Ijtra150317Ijtra150317
Ijtra150317
ย 
UNDERSTANDING ENTREPRENEURSHIP: IMPACT OF OVERCONFIDENCE ON ENTREPRENEURSHIP
UNDERSTANDING ENTREPRENEURSHIP: IMPACT OF OVERCONFIDENCE ON ENTREPRENEURSHIPUNDERSTANDING ENTREPRENEURSHIP: IMPACT OF OVERCONFIDENCE ON ENTREPRENEURSHIP
UNDERSTANDING ENTREPRENEURSHIP: IMPACT OF OVERCONFIDENCE ON ENTREPRENEURSHIP
ย 
Ijtra130511
Ijtra130511Ijtra130511
Ijtra130511
ย 
SCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEW
SCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEWSCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEW
SCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEW
ย 
USING SOCIAL NETWORKING AS A MECHANISM TO ACHIEVE BRAND RESONANCE: AN EMPIRIC...
USING SOCIAL NETWORKING AS A MECHANISM TO ACHIEVE BRAND RESONANCE: AN EMPIRIC...USING SOCIAL NETWORKING AS A MECHANISM TO ACHIEVE BRAND RESONANCE: AN EMPIRIC...
USING SOCIAL NETWORKING AS A MECHANISM TO ACHIEVE BRAND RESONANCE: AN EMPIRIC...
ย 
OXIDATIVE STRESS AND NITRIC OXIDE: A SIGNIFICANT MARKER IN CORONARY ARTERY DI...
OXIDATIVE STRESS AND NITRIC OXIDE: A SIGNIFICANT MARKER IN CORONARY ARTERY DI...OXIDATIVE STRESS AND NITRIC OXIDE: A SIGNIFICANT MARKER IN CORONARY ARTERY DI...
OXIDATIVE STRESS AND NITRIC OXIDE: A SIGNIFICANT MARKER IN CORONARY ARTERY DI...
ย 
PERFORMANCE EVALUATION OF DIFFERENT CLASSIFIER ON BREAST CANCER
PERFORMANCE EVALUATION OF DIFFERENT CLASSIFIER ON BREAST CANCERPERFORMANCE EVALUATION OF DIFFERENT CLASSIFIER ON BREAST CANCER
PERFORMANCE EVALUATION OF DIFFERENT CLASSIFIER ON BREAST CANCER
ย 
EFFICIENT EMBEDDED SURVEILLANCE SYSTEM WITH AUTO IMAGE CAPTURING AND EMAIL SE...
EFFICIENT EMBEDDED SURVEILLANCE SYSTEM WITH AUTO IMAGE CAPTURING AND EMAIL SE...EFFICIENT EMBEDDED SURVEILLANCE SYSTEM WITH AUTO IMAGE CAPTURING AND EMAIL SE...
EFFICIENT EMBEDDED SURVEILLANCE SYSTEM WITH AUTO IMAGE CAPTURING AND EMAIL SE...
ย 
THE FUNDAMENTAL ANALYSIS-THE BEST WAY TO EVALUATE EQUITY SHARES
THE FUNDAMENTAL ANALYSIS-THE BEST WAY TO EVALUATE EQUITY SHARESTHE FUNDAMENTAL ANALYSIS-THE BEST WAY TO EVALUATE EQUITY SHARES
THE FUNDAMENTAL ANALYSIS-THE BEST WAY TO EVALUATE EQUITY SHARES
ย 
ENVISIONING AND IMPLEMENTING PROJECT IN REAL TIME (AN ALGORITHMIC APPROACH)
ENVISIONING AND IMPLEMENTING PROJECT IN REAL TIME (AN ALGORITHMIC APPROACH)ENVISIONING AND IMPLEMENTING PROJECT IN REAL TIME (AN ALGORITHMIC APPROACH)
ENVISIONING AND IMPLEMENTING PROJECT IN REAL TIME (AN ALGORITHMIC APPROACH)
ย 
IDENTIFICATIONS OF ELECTRICAL AND ELECTRONIC EQUIPMENT POLYMER WASTE TYPES US...
IDENTIFICATIONS OF ELECTRICAL AND ELECTRONIC EQUIPMENT POLYMER WASTE TYPES US...IDENTIFICATIONS OF ELECTRICAL AND ELECTRONIC EQUIPMENT POLYMER WASTE TYPES US...
IDENTIFICATIONS OF ELECTRICAL AND ELECTRONIC EQUIPMENT POLYMER WASTE TYPES US...
ย 
STATIC AND MODAL ANALYSIS OF LEAF SPRING USING FEA
STATIC AND MODAL ANALYSIS OF LEAF SPRING USING FEASTATIC AND MODAL ANALYSIS OF LEAF SPRING USING FEA
STATIC AND MODAL ANALYSIS OF LEAF SPRING USING FEA
ย 
STATE OF ART IN MODERN RESISTANCE SPOT WELDING
STATE OF ART IN MODERN RESISTANCE SPOT WELDINGSTATE OF ART IN MODERN RESISTANCE SPOT WELDING
STATE OF ART IN MODERN RESISTANCE SPOT WELDING
ย 
COMPARATIVE STUDY OF BELL PEPPER ON THE ASPECTS OF THEIR APPROXIMATE ANALYSIS...
COMPARATIVE STUDY OF BELL PEPPER ON THE ASPECTS OF THEIR APPROXIMATE ANALYSIS...COMPARATIVE STUDY OF BELL PEPPER ON THE ASPECTS OF THEIR APPROXIMATE ANALYSIS...
COMPARATIVE STUDY OF BELL PEPPER ON THE ASPECTS OF THEIR APPROXIMATE ANALYSIS...
ย 
TRAFFIC NOISE ATTENUATION IN SELFPROTECTED BUILDING ENVELOPS
TRAFFIC NOISE ATTENUATION IN SELFPROTECTED BUILDING ENVELOPSTRAFFIC NOISE ATTENUATION IN SELFPROTECTED BUILDING ENVELOPS
TRAFFIC NOISE ATTENUATION IN SELFPROTECTED BUILDING ENVELOPS
ย 
EFFECT OF DIFFERENT CONCENTRATIONS OF AUXINS AND COMBINATION WITH KINETIN ON ...
EFFECT OF DIFFERENT CONCENTRATIONS OF AUXINS AND COMBINATION WITH KINETIN ON ...EFFECT OF DIFFERENT CONCENTRATIONS OF AUXINS AND COMBINATION WITH KINETIN ON ...
EFFECT OF DIFFERENT CONCENTRATIONS OF AUXINS AND COMBINATION WITH KINETIN ON ...
ย 

Similar to COMPARISON OF OLSR AND ENERGY CONSERVED OLSR

A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A Review
BRNSSPublicationHubI
ย 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
Editor IJARCET
ย 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
Editor IJARCET
ย 
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...
eSAT Journals
ย 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
ijdpsjournal
ย 

Similar to COMPARISON OF OLSR AND ENERGY CONSERVED OLSR (20)

Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
ย 
Extension of Optimized Linked State Routing Protocol For Energy Efficient App...
Extension of Optimized Linked State Routing Protocol For Energy Efficient App...Extension of Optimized Linked State Routing Protocol For Energy Efficient App...
Extension of Optimized Linked State Routing Protocol For Energy Efficient App...
ย 
A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A Review
ย 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
ย 
Energy and Performance Evaluation of Reactive, Proactive, and Hybrid Routing ...
Energy and Performance Evaluation of Reactive, Proactive, and Hybrid Routing ...Energy and Performance Evaluation of Reactive, Proactive, and Hybrid Routing ...
Energy and Performance Evaluation of Reactive, Proactive, and Hybrid Routing ...
ย 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
ย 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
ย 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
ย 
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing ProtocolsQoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
ย 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
ย 
To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...
ย 
Ft3410671073
Ft3410671073Ft3410671073
Ft3410671073
ย 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission using
ย 
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...
ย 
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
ย 
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
ย 
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
ย 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
ย 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
ย 
IJET-V2I6P7
IJET-V2I6P7IJET-V2I6P7
IJET-V2I6P7
ย 

More from International Journal of Technical Research & Application

EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
International Journal of Technical Research & Application
ย 
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
International Journal of Technical Research & Application
ย 
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
International Journal of Technical Research & Application
ย 
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIRAN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
International Journal of Technical Research & Application
ย 
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTYEFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
International Journal of Technical Research & Application
ย 
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
International Journal of Technical Research & Application
ย 

More from International Journal of Technical Research & Application (20)

STUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEW
STUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEWSTUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEW
STUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEW
ย 
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
ย 
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
ย 
STUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONS
STUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONSSTUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONS
STUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONS
ย 
ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...
ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...
ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...
ย 
POD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTER
POD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTERPOD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTER
POD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTER
ย 
DIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGA
DIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGADIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGA
DIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGA
ย 
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
ย 
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIRAN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
ย 
LI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESS
LI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESSLI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESS
LI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESS
ย 
QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...
QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...
QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...
ย 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
ย 
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTYEFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
ย 
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
ย 
THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...
THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...
THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...
ย 
TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...
TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...
TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...
ย 
A STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASH
A STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASHA STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASH
A STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASH
ย 
AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...
AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...
AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...
ย 
OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...
OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...
OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...
ย 
PERFORMANCE ANALYSIS OF MICROSTRIP PATCH ANTENNA USING COAXIAL PROBE FEED TEC...
PERFORMANCE ANALYSIS OF MICROSTRIP PATCH ANTENNA USING COAXIAL PROBE FEED TEC...PERFORMANCE ANALYSIS OF MICROSTRIP PATCH ANTENNA USING COAXIAL PROBE FEED TEC...
PERFORMANCE ANALYSIS OF MICROSTRIP PATCH ANTENNA USING COAXIAL PROBE FEED TEC...
ย 

Recently uploaded

VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
SUHANI PANDEY
ย 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
ย 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
ย 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
KreezheaRecto
ย 

Recently uploaded (20)

Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
ย 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
ย 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
ย 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
ย 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
ย 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ย 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
ย 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
ย 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
ย 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
ย 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
ย 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
ย 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
ย 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
ย 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
ย 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ย 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
ย 

COMPARISON OF OLSR AND ENERGY CONSERVED OLSR

  • 1. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 2, Issue 4 (July-Aug 2014), PP. 05-08 5 | P a g e COMPARISON OF OLSR AND ENERGY CONSERVED OLSR Mrs. Ladkat Shital Anandrao, Prof. Jakhade Yashashree Amey Department Of Information Technology Sinhgad College Of Engineering, Pune. Abstractโ€” An ad hoc wireless network contains mobile networks which creates an underlying architecture for communication without the help of traditional fixed-position routers. Nevertheless, the architecture must maintain communication routes although the hosts are mobile and they have limited transmission range. There are different protocols for handling the routing in the mobile environment. This paper will focus on two well know algorithms: Optimized Link State Routing Protocol and Optimized Linked State Routing Protocol for Energy Consumption. Key wordsโ€” EOLSR, OLSR, Routing. I.INTRODUCTION Wireless communication technology is growing daily; with such growth sooner it would not be physically possible to have a fixed architecture for this kind of network. Ad hoc wireless network must be capable to self-organize and self-configure due to the fact that the mobile structure is varying all the time. Mobile hosts have a restricted range and sending the message to another host, which is not in the senderโ€™s host transmission range, must be forwarded through the network using other hosts which will be used as routers for transporting the message throughout the network. The mobile host must use broadcast for sending messages and should be in fast mode for message throughout the network. The mobile host must use broadcast for sending messages and should be in fast mode for accepting any messages that it receives. In the ad hoc network there can be unidirectional hosts that can transmit only to the one direction, so that the communication is not bi-directional as in the usual communication systems. [4, 5, 8] The routing protocols for ad hoc wireless network should be able to handle a large number of hosts with limited resources, such as bandwidth and energy. The main inspiration for the routing protocols is that they must also deal with host movability, meaning that hosts can appear and disappear in various places. Therefore, all hosts of the ad hoc network behave as routers and must play a role in the route discovery and maintenance of the routes to the other hosts. For ad hoc routing protocols it is important to minimize routing messages overhead in spite of the increasing number of hosts and their mobility. Maintaining the routing table small is another important issue, because the increase of the routing table will have an impact on the control packets transmitted in the network and this in turn will affect large link overheads. [4, 5, 8]. Routing protocols are partitioned into two categories based on how and when routes are found, but both find the shortest path to the destination. Proactive routing protocols are table- driven protocols, they always maintain current up-to-date routing information by transmitting control messages frequently between the hosts which alter their routing tables. When there are alterations in the structure then the updates are propagated throughout the network. The proactive routing protocols consist of link-state routing algorithms which frequently flood the link information about its neighbors. Other routing protocols are on-demand routing protocols, in other words reactive, ones which establish routes when they are needed by the source host and these routes are maintained while they are required. When nodes exchange vectors of information, each host alter own routing information when needed. The ad hoc routing protocols are usually classified as a pure proactive or a pure reactive protocol, but there are also hybrid protocols. Fig. 1 Routing in wireless sensor network [1] II.OPTIMIZED LINK STATE ROUTING PROTOCOL (OLSR) A. Introduction Optimized Link State Protocol (OLSR) is a proactive routing protocol, so the routes are always instantly accessible when needed. OLSR is optimization version of a pure link state protocol. So the topological changes cause the flooding of the topological information to all accessible hosts in the network. The idea of MPR is to minimize flooding of broadcasts by minimizing the same broadcast in some regions in the network. Another minimization is to provide the shortest path. Minimizing the time interval for the control messages transmission can bring more reactivity to the topological changes. [3, 4, 5, 10, 11, 12, 7] OLSR proposes two kinds of the control messages: Hello and Topology Control (TC). Hello messages served for finding the information about the link status and the hostโ€™s neighbors. With the Hello message the Multipoint Relay (MPR) Selector set is built which describes which neighbors has selected this host to act as MPR and from this information the host can calculate its own set of the MPRs. The Hello messages are transmitted only one hop away but the TC messages are broadcasted throughout the complete network. TC messages are utilized for broadcasting information about own advertised neighbors which includes at least the MPR Selector list. The TC messages are broadcasted frequently and only the MPR hosts can forward the TC
  • 2. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 2, Issue 4 (July-Aug 2014), PP. 05-08 6 | P a g e messages [2, 3, 10, 11, 12, 7]. There is also Multiple Interface Declaration (MID) messages which are utilized for informing other host that the announcing host can have multiple OLSR interface addresses. The MID message is broadcasted throughout the complete network only by MPRs. There is also a โ€œHost and Network Associationโ€ (HNA) message which serves the external routing information by giving the possibility for routing to the external addresses. The HNA message gives information about the network- and the netmask addresses, so that OLSR host can consider that the reporting host can act as a gateway to the reporting set of addresses. The HNA is considered as a generalized version of the TC message with only difference that the TC message can inform about path cancelling while HNA message information is eliminated only after expiration time. B. Routing The link in the ad hoc network can be either unidirectional or bidirectional so the host must aware of this information about the neighbors. The Hello messages are broadcasted frequently for the neighbor sensing. The Hello messages are only broadcasted one hop away so that they are not forwarded afterwards. When the first host accept the Hello message from the second host, it sets the second host status to asymmetric in the routing table. When the first host sends a Hello message and it understands that, it has the link to the second host as asymmetric, the second host set first host status to symmetric in own routing table. Finally, when second host transmit again Hello message, where the status of the link for the first host is indicated as symmetric, then first host changes the status from asymmetric to symmetric. In the end both hosts understand that their neighbor is alive and the corresponding link is bidirectional. [2, 8, 11, 9] The Hello messages are utilized for getting the information about local links and neighbors. The Hello messages periodic broadcasting is used for link sensing, neighborโ€™s discovery and MPR selection method. Hello message contains: information how often the host transmits Hello messages, willingness of host to act as a Multipoint Relay, and information about its neighbor. Information about the neighbors contains: interface address, link type and neighbor type. The link type shows that the link is symmetric, asymmetric or simply lost. The neighbor type is just symmetric, MPR or not a neighbor. The MPR type shows that the link to the neighbor is symmetric and that this host has chosen it as Multipoint Relay. [2] The Multipoint Relays (MPR) is the main idea behind the OLSR protocol to minimize the information exchange overhead. Instead of pure flooding the OLSR uses MPR to minimize the number of the host which broadcasts the information throughout the network. The MPR is a hostโ€™s one hop neighbor which may forward its message packets. The MPR set of host is kept small in order for the protocol to be efficient. In OLSR only the MPRs can forward the data throughout the complete network [2]. Each host must have the information about the symmetric one hop and two hop neighbors to calculate the optimal MPR set. Information about the neighbors is taken from the Hello messages. The two hop neighbors are found from the Hello message because each Hello message contains all the hostsโ€™ neighbors. Selecting the minimum number of the one hop neighbors which covers all the two hop neighbors is the aim of the MPR selection algorithm. Each host has the Multipoint Relay Selector set, shows which hosts has chosen the current host to act as a MPR [9, 10, 12, 7]. When the host gets a new broadcast message, which is require to be scatter throughout the network and the messageโ€™s sender interface address is in the MPR Selector set, then the host must convey the message. Due to the possible alteration in the ad hoc network, the MPR Selectors sets are updated repeatedly using Hello messages. [2] The algorithm constructs the MPR set which contains less number of the one hop symmetric neighbors from which it is possible to reach all the symmetrical strict two hop neighbors. The host must have the information about one and two hop symmetric neighbors to start the needed calculation for the MPR set. All the transfer of information is broadcasted using Hello messages. The neighbors which have status of willingness different than WILL_NEVER in the Hello message can be chosen to act as MPR. The neighbor must be symmetric in order to become an MPR. In order to exchange the topological information and build the topology information base the host that were selected as MPR need to sent the topology control (TC) message. The TC messages are broadcasted throughout the network and only MPR are allowed to forward TC messages. The TC messages are generated and broadcasted periodically in the network. [2] The TC message is sent by a host in order to advertise own links in the network. The host must send at least the links of its MPR selector set. The TC message includes the own set of advertised links and the sequence number of each message. The sequence number is used to avoid loops of the messages and for indicating the freshness of the message, so if the host gets a message with the smaller sequence number it must discard the message without any updates. The host must increment the sequence number when the links are removed from the TC message and also it should increment the sequence number when the links are added to the message. The sequence numbers are wrapped around. When the hosts advertised links set becomes empty, it should still send empty TC messages for specified amount of time, in order to invalidate previous TC messages. This should stop sending the TC messages until it has again some information to send. [2, 8, 11, 9] The size of the TC message can be quite big, so the TC message can be sent in parts, but then the receiver must combine all parts during some specified amount of time. Host can increase its transmission rate to become more sensible to the possible link failures. When the change in the MPR Selector set is noticed, it indicates that the link failure has happened and the host must transmit the new TC message as soon as possible.[2] The host maintains the routing table, the routing table entries have following information: destination address, next address, number of hops to the destination and local interface address. Next address indicates the next hop host. The information is got from the topological set (from the TC messages) and from the local link information base (from the Hello messages). So if any changes occur in these sets, then the routing table is recalculated. Because this is proactive protocol then the routing table must have routes for all available hosts in the network. The information about broken links or partially known links is not stored in the routing table. [2, 8, 3] The routing table is changed if the changes occur in the following cases: neighbor link appear or disappear, two hops neighbor is created or removed, topological link is appeared or lost or when the multiple interface association information changes. But the update of this information does not lead to the sending of the
  • 3. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 2, Issue 4 (July-Aug 2014), PP. 05-08 7 | P a g e messages into the network. For finding the routes for the routing table entry the shortest path algorithm is used. [2, 8, 3] III.OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSUMPTION In this section, the modification steps for OLSR protocol are discussed. The modified protocol is named as EOLSR. The OLSR protocol is modified in two processes i.e. while selecting MPR nodes and while calculating route for forwarding data [6]. A. MPR Selection The existing OLSR consumes more energy in energy constrained applications which results in less network lifetime. To improve network lifetime as well as energy efficiency OLSR is modified by using two approaches as below; 1. By setting threshold for Residual Energy 2. By setting threshold for Energy Consumption For MPR selection we have decided a threshold value, which is one third of initial energy for both residual energy and energy consumption approach. 1. If the residual energy of node is less than threshold value then node having LOW-MPRWILL while residual energy of node is more than threshold value then node having HIGH-MPR-WILL. 2. If the energy consumed by node is less than threshold value then node having HIGHMPR-WILL while consumed energy of node is more than threshold value then node having LOW-MPR-WILL. Figure 2. Flow Chart for residual Energy and Energy Consumption Approach B. New HELLO and TC packet format HELLO packets are used for selection of MPR nodes. For selection of MPR each node having, 1. Highest residual energy 2. Lowest energy consumption There is requirement to change residual energy of each node at regular interval. For this purpose the value of residual energy and energy consumed by node is included in HELLO packet. The reserved part in OLSR HELLO packet format is assigned to residual energy in EOLSR-RE and energy consumption in EOLSR-EC. Each node sends HELLO packet with entry for current residual energy and depending on threshold value set it selects MPR node. The reserved part in TC packet is modified with entry for residual energy and energy consumption of node .The TC packets are transmitted to entire network with the help of MPR nodes. The TC packets are used to disseminate topology information over complete network. The modified TC packet format forwards residual energy of each node and energy consumed by each node over complete network. After knowing topology information for each node in network the route computation is performed. No. of Connection Energy Consumption EOLSR- RE OLSR EOLSR- EC 16 10.3874 10.5285 10.4421 18 9.98939 12.5364 10.2235 20 10.7527 13.9693 11.9932 22 13.5147 15.7888 14.3235 24 15.6768 17.9791 16.5433 Table 1.Impact of variation of number of connections on Energy Consumption Figure 3: Impact of Variation of number of Nodes on Energy Consumption IV.CONCLUSION In this paper, we compared EOLSR-RE and EOLSR-EC over OLSR. From this discussion, we can say that EOLSR-RE is best protocol in terms of energy efficiency. The average energy consumption increases with node density, node speed. Control overheads are directly proportional to node density while it remains constant for alteration of node speed. EOLSR-RE is suitable option in military applications, disaster recovery areas and remote areas such as forests where energy saving is important requirement. REFERENCES [1] Michael Chien-Chun Hung, Kate Ching-Ju Lin, Cheng-Fu Chou and Chih-Cheng Hsu Article โ€œEFFORT: energy-efficient opportunistic routing technology in wireless sensor networks โ€œ(pages 760โ€“773)first published online: 30 MAY 2011 | DOI: 10.1002/wcm.1140
  • 4. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 2, Issue 4 (July-Aug 2014), PP. 05-08 8 | P a g e [2] T. Clausen and P. Jacquet โ€œOptimized Link State Routing Protocol (OLSR).โ€ RFC 3626, IETF Network Working Group, October 2003. [3] Ying Ge, Thomas Kunz and Louise Lamont โ€œQuality of Service Routing in Ad-Hoc Networks Using OLSR.โ€ Proceeding of the 36th Hawaii International Conference on System Science(HICSSโ€™03) [4] Xiaoyan Hong, Kaixin Xu and Mario Gerla โ€œScalable Routing Protocols for mobile Ad Hoc Networks.โ€ Computer Science Department, University of California, Los Angeles, August 2002. [5] Koey Huishan, Chua Huimin and Koh Yeow Nam โ€œRouting Protocols in Ad hocWireless Networks.โ€ National University of Singapore. [6] Mayur Tokekar and Radhika D. Joshi, โ€œEnhancement of Optimized Linked State Routing Protocol for Energy Conservationโ€, CCSEA 2011, CS & IT 02, pp. 305โ€“319, 2011. [7] P.Jacquet, A. Laouiti, P. Minet and L. Viennot โ€œPerformance Analysis of OLSR Multipoint Relay Flooding in Two Ad Hoc Wireless Network Models.โ€ Research Report-4260. INRIA, September 2001. RSRCP journal special issue on Mobility and Internet. [8] P.Jacquet, P. Mรผhlethaler, T Clausen, A. Laouiti, A. Qayyum and L. Viennot โ€œOptimized Link State Protocol for Ad Hoc Networks.โ€ IEEE INMIC Pakistan 2001. [9] A. Laouti, P. Mรผhlethaler, A. Najid and E. Plakoo โ€œSimulation Results of the OLSR Routing Protocol for Wireless Network.โ€ 1st Mediterranean Ad-Hoc Networks workshop (Med-Hoc-Net). Sardegna, Italy 2002. [10] P. Jacquet, A. Laouiti, P. Minet and L. Viennot โ€œPerformance of multipoint relaying in ad hoc mobile routing protocols.โ€ Networking 2002. ise(Italy)2002. [11] T.H. Clausen, G. Hansen, L.Christensen and G. Behrmann โ€œThe Optimized Link State Routing Protocol, Evaluation through Experiments and Simulation.โ€ IEEE Symposium on "Wireless Personal Mobile Communications". September 2001. [12] A. Laouiti, A. Qayyum and L. Viennot โ€œMultipoint Relaying for Flooding Broadcast Messages in Mobile Wireless Networks.โ€ 35th Annual Hawaii International Conference on System Sciences (HICSSโ€™2002).