SlideShare a Scribd company logo
International Journal of Engineering and Techniques - Volume 2 Issue 6, Nov – Dec 2016
ISSN: 2395-1303 http://www.ijetjournal.org Page 45
A study on Optimized Link State Routing Protocol (OLSR),Address
Resolution Protocol (ARP) and Dynamic Host Configuration
Protocol (DHCP)
Satyam Awasthi1
, Soumosir Dutta2
,Deepanshu Arora3
, Prof. Manikandan K4
School of Computer Engineering ,Vellore Institute of Technology, Vellore, Tamil Nadu
I. INTRODUCTION
A collection of wireless mobile hosts that are ready to
dynamically establish a short lived network with none support
from fixed infrastructure is Mobile Ad-hoc Network
(MANET). The mobile hosts are connected via wireless links
and acts as a router for each other. MANETs finds the
simplest way in fields wherever communication infrastructure
is pricey and/or time overwhelming. The properties of
MANETs that's mobility and absence of infrastructure makes
to applicable to operations with time constraints and rescue
operations. several analyzers performed research within the
space of wireless multi-hop networks by pc simulations and
experiments. Most of them aren't targeted on up mobility
however throughput was taken care of .A concept of dynamic
probabilistic broadcasting scheme for mobile ad-hoc networks
was proposed where nodes move according to different
mobility models. this idea or approach out performs the FP-
AODV (Fixed probability Ad-hoc on-demand Distance
Vector) and simple AODV in terms of saved rebroadcast
underneath completely different mobility models. It in
addition achieves higher saved rebroadcast and low collision
in addition as a low range of relays than the fixed probabilistic
scheme and straightforward AODV. Being a proactive
protocol, routes to all or any destinations inside the network
are noted and maintained before use. Having the routes
obtainable inside the standard routing table will be helpful for
a few systems and network applications as there's no route
discovery delay related to finding a brand new route. The
routing overhead generated, while usually larger than that of a
reactive protocol, doesn't increase with the amount of routes
being created. The approach also can be optimized on terms of
period provided for the nodes by the protocol and by reducing
the topology control overhead. Another approach known as
OLSR-L which mixes the routing protocol and location
protocol that will increase the strength of the network.
II. ROUTING PROTOCOL
The OLSR protocol may be a proactive routing protocol,
that builds up a route for information transmission by
maintaining a routing table within each node of the network.
The routing table is computed upon the information of
topology info, that is changed by suggests that of Topology
control (TC) packets. The TC packets successively square
measure designed when each node has crammed its neighbor
list. This list contains the identity of neighbor nodes. A node is
taken into account as a neighbor if and provided that it are
often reached via a bi-directional link. OLSR makes use of
hello messages to seek out its one-hop neighbors and its two-
hop neighbors through their responses. The sender will then
choose its Multi point Relays (MPR) supported the one-hop
nodes which supply the most effective routes to the two-hop
nodes. during this approach, the quantity of management
traffic are often reduced. every node has conjointly AN MPR
selector set that enumerates nodes that have chosen it as an
MPR node. OLSR uses TC messages beside MPR forwarding
to disperse neighbor info throughout the network. Packet loss
is usually computed at higher layers than routing one.
However, AN estimate of the packet loss is required by OLSR
so as to assign a weight or a state to each link. Host Network
Address (HNA) messages square measure employed by OLSR
to disperse network route advertisements within the same
approach that TC messages advertise host routes. each node
computes the trail toward a destination by suggests that of a
simple shortest-path algorithmic program, with hop-count as
target metric. during this approach, a shortest path may end up
to be conjointly not smart, from the purpose of read of the
packet error rate. consequently, recently olsrd has been
RESEARCH ARTICLE OPEN ACCESS
Abstract:
A Mobile Ad-hoc network is a set of mobile terminals moving in different directions at different
speed being wirelessly connected to each-other. In this paper we study the proactive Link State Routing
Protocol – OLSR, which uses hello and topology control (TC) messages to find then distribute link state
data throughout the mobile ad hoc network. Individual nodes use this topology data to calculate next hop
destinations for all nodes within the network using shortest hop forwarding paths. We then suggest ways
by which the existing algorithm can be optimized in terms of delay, throughput, power consumption, jitter
etc. Finally we summarize the applications of OLSR.
International Journal of Engineering and Techniques - Volume 2 Issue 6, Nov – Dec 2016
ISSN: 2395-1303 http://www.ijetjournal.org Page 46
equipped with the LQ extension, that may be a shortest-path
algorithmic program with the typical of the packet error rate as
metric. This metric is usually referred to as because the ETX,
that is outlined as ETX(i) = 1/(NI(i) × LQI(i)).
Given a sampling window W , NI(i) is the packet arrival
rate seen by a node on the i-th link during W . Similarly,
LQI(i) is the estimation of the packet arrival rate seen by the
neighbor node which uses the i-th link. When the link has a
low packet error rate, the ETX metric is higher. The LQ
extension greatly enhances the packet delivery ratio with
respect to the hysteresis-based technique.
III. ADDRESS RESOLUTION PROTOCOL
ADDRESS RESOLUTION PROTOCOL or ARP is used to
establish connection between nodes or hosts of the same
network and hence means a communication between them.
After every hosts gets it’s IP address assigned by DHCP or
Dynamic Host Configuration Protocol, its being connected by
switch to other nodes. The switch being a layer 2 device has
MAC address table which has a room for MAC address along
with port number, initially empty. Each node has a ARP cache
which maintains IP address with corresponding MAC Address
of the hosts, its being connected to sometime. Initially it is
also empty. For intra-network message passing , the Source
has its own Source MAC generated from NIC and its own IP
address known. The destination IP address is known for
communication but MAC is unknown hence a broadcast MAC
address is being assigned as destination address i.e
ff::ff::ff::ff::ff::ff and the packet is forwarded to the switch.
The switch on receiving broadcast MAC broadcast the
message to all other nodes in the network and simultaneously
updating its MAC address table with Port Number of Source
in switch and corresponding address.
Every other node receives the address and matches it with its
own IP address. In case of mismatch the packet is dropped but
if the IP matches then the destination send a reply with its
MAC address and IP address. The switch on receiving the
reply updates its MAC table with port number and hosts
information about its address. The reply is hence forwarded to
the source matching the port number from earlier updated
table. After receiving the reply , the original hosts updates its
ARP cache for further reference and communication, now a
smoother communication can be done as every other thing is
known.
On connection reset the ARP cache is reset along with the
MAC address table information is lost and again we need to
perform ARP for connection establishment. If the switch
encounters a destination IP other than its network address or
network address of the network, then it is redirected to the
nearest gateway for internetwork communication.
IV. DYNAMIC HOST CONFIGURATION PROTOCOL
With the increasing number of internet users, there is a need of
efficiently assigning IP address to each node in a network.
Manually assigning will cause time delay and wastage of IP
addresses. Hence a solution is DHCP which has four
fundamental steps in doing operation. The acronym DORA
can be used to remember the steps well.
D for Discovery is a process where the node or host which try
to enter the network has its source IP address as 0.0.0.0
initially and destination IP and MAC as 255.255.255.255 and
ff::ff::ff::ff::ff::ff. Source MAC is its own MAC address from
NIC.A discovery packet is being broadcasted and reaches the
DHCP server. Other intermediate nodes discards it. The
DHCP server has a port of address in it with same network
address. It picks up the first unassigned IP address and hence
the second step OFFER i.e. the IP address is broadcasted back
to the source. The source on receiving the offers IP address
accepts it and REQUEST message id being sent back that it
would like to keep the IP address. A acknowledgement packet
is the send by unicast to the host and hence the IP is being
assigned. Now the IP address is used for both internetwork
communication and intranetworking.
Once the node is reset or disconnected the IP address assigned
is free and the DHCP server pool has a IP address now
available and allocated the freed IP to some othe node who has
demanded it.
In real scenario, often there are more than one DHCP servers
hence the second step OFFER is a broadcast message that is
the node can receive many offers from DHCPs but will choose
one and discard others, hence for 3rd step , Request there is
communicating with the DHCP server chosen and the rest
which are not chosen.
V. APPLICATION
For MANETS the performance of a protocol is coupled with a
wide variety of issues mainly physical layer technology, link
layer capacity etc and this is because of its' inherent wireless
nature. The overall strengths of a routing protocol specifies
which domain it could be used in. OLSR a proactive or table
driven protocol is used in areas where this access to stored
information favors the scenario and new route requests are
quite frequent. The protocol also goes in where long delay in
packet transmission is not allowable. OLSR is adopted in
scenarios where the nodes are dense and communication can
be expected to occur between a large numbers of nodes quite
frequently.
VI. CONCLUSION
OLSR as we have seen is best for situations of dense network
topology, a system that guarantees high packet delivery ratio
in such situations. Still we have seen it can be improved in
various ways as stated in topology control methods, OLSR-L
and BATMAN network routing protocols.
Acknowledgment
We are extremely grateful to professors of Computer
Engineering,VIT University, Vellore for the support in our
International Journal of Engineering and Techniques - Volume 2 Issue 6, Nov – Dec 2016
ISSN: 2395-1303 http://www.ijetjournal.org Page 47
learning of network simulation. I would also like to grab this
opportunity to thank Professor Manikandan K. for his constant
guidance and help without which this paper would not have
been successful.
References
[1] Hiroshi Mineno, Kazuyoshi Soga, Tomoya Takenaka, Yoshiaki
Terashima, Tadanori Mizuno, “Integrated protocol for optimized link
state routing and localization:OLSR-L”, Simulation Modelling Practice
and Theory(2011).
[2] Elis Kulla,Masahiro Hiyama, Makoto Ikeda, Leonard Barolli ,
“Performance comparison of OLSR and BATMAN routing protocol by
a MANET testbed in stairs enviorment”, Computers and Mathematics
with Applications.
[3] Abdelali Boushaba, Adil Benabbou, Rachid Benabbou,Azeddine Zahi,
Mohammed Oumsis ,"Multi-point relay selection strategies to reduce
topology control traffic for OLSR protocol in MANETs", Journal of
Network and Computer Applications (2015).
[4] Jan-Maarten Verbree, Maurits de Graaf, Johann Hurink,"An analysis of
the lifetime of OLSR networks", Ad Hoc Networks(2010).
[5] Anand Dersingh, Z.M. Faizul Islam, Shahram Shah Heydari, Md.
Mustafizur Rahman , "OLSR-based Topology Discovery for Mobile
Situational Awareness Systems "
[6] S. Mohapatra, P.Kanungo, "Performance analysis of AODV, DSR,
OLSR and DSDV Routing Protocols using NS2 Simulator", Procedia
Engineering (2012).
[7] Zhihao Guo, Shahdi Malakooti, Shaya Sheikh, Camelia Al-Najjar,
Behnam Malakooti, "Multi-objective OLSR for proactive routing in
MANET with delay, energy, and link lifetime predictions", Applied
Mathematical Modelling(2011).

More Related Content

What's hot

Network layer u3
Network  layer u3Network  layer u3
Network layer u3
IndrajaMeghavathula
 
Network layer
Network layerNetwork layer
Network layer
Hasib Shaikh
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission using
eSAT Publishing House
 
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...
eSAT Journals
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
International Journal of Engineering Inventions www.ijeijournal.com
 
Comparison between aodv and olsr protocol
Comparison between aodv and olsr protocolComparison between aodv and olsr protocol
Comparison between aodv and olsr protocol
Mehedi
 
Networking interview questions and answers
Networking interview questions and answersNetworking interview questions and answers
Networking interview questions and answers
Amit Tiwari
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
Raj Sikarwar
 
internet protocols
internet protocolsinternet protocols
internet protocols
Srinivasa Rao
 
Network Layer
Network LayerNetwork Layer
Network Layer
reshmadayma
 
AODV Protocol
AODV ProtocolAODV Protocol
AODV Protocol
Darshan Rathi
 
Exploration network chapter_5_modified
Exploration network chapter_5_modifiedExploration network chapter_5_modified
Exploration network chapter_5_modified
rajesh531
 
Lecture 3 network layer
Lecture 3 network layerLecture 3 network layer
Lecture 3 network layer
Ronoh Kennedy
 
Advanced Computing Techonologies
Advanced Computing TechonologiesAdvanced Computing Techonologies
Advanced Computing Techonologies
Kathirvel Ayyaswamy
 
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
Performance Analysis and Simulation of  OLSR Routing Protocol in MANET Performance Analysis and Simulation of  OLSR Routing Protocol in MANET
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
ijcnac
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
Kathirvel Ayyaswamy
 
Network layer new
Network layer newNetwork layer new
Network layer new
reshmadayma
 
An Efficient FB Addressing Protocol for Auto configuration of Ad Hoc Networks
An Efficient FB Addressing Protocol for Auto configuration of Ad Hoc NetworksAn Efficient FB Addressing Protocol for Auto configuration of Ad Hoc Networks
An Efficient FB Addressing Protocol for Auto configuration of Ad Hoc Networks
ijceronline
 
Ipv4 tutorial
Ipv4 tutorialIpv4 tutorial
Ipv4 tutorial
saryu2011
 
NAT
NATNAT

What's hot (20)

Network layer u3
Network  layer u3Network  layer u3
Network layer u3
 
Network layer
Network layerNetwork layer
Network layer
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission using
 
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Comparison between aodv and olsr protocol
Comparison between aodv and olsr protocolComparison between aodv and olsr protocol
Comparison between aodv and olsr protocol
 
Networking interview questions and answers
Networking interview questions and answersNetworking interview questions and answers
Networking interview questions and answers
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
internet protocols
internet protocolsinternet protocols
internet protocols
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
AODV Protocol
AODV ProtocolAODV Protocol
AODV Protocol
 
Exploration network chapter_5_modified
Exploration network chapter_5_modifiedExploration network chapter_5_modified
Exploration network chapter_5_modified
 
Lecture 3 network layer
Lecture 3 network layerLecture 3 network layer
Lecture 3 network layer
 
Advanced Computing Techonologies
Advanced Computing TechonologiesAdvanced Computing Techonologies
Advanced Computing Techonologies
 
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
Performance Analysis and Simulation of  OLSR Routing Protocol in MANET Performance Analysis and Simulation of  OLSR Routing Protocol in MANET
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Network layer new
Network layer newNetwork layer new
Network layer new
 
An Efficient FB Addressing Protocol for Auto configuration of Ad Hoc Networks
An Efficient FB Addressing Protocol for Auto configuration of Ad Hoc NetworksAn Efficient FB Addressing Protocol for Auto configuration of Ad Hoc Networks
An Efficient FB Addressing Protocol for Auto configuration of Ad Hoc Networks
 
Ipv4 tutorial
Ipv4 tutorialIpv4 tutorial
Ipv4 tutorial
 
NAT
NATNAT
NAT
 

Similar to IJET-V2I6P7

A Survey On IP Address Assignment In A Mobile Ad Hoc
A Survey On IP Address Assignment In A Mobile Ad HocA Survey On IP Address Assignment In A Mobile Ad Hoc
A Survey On IP Address Assignment In A Mobile Ad Hoc
Kristen Flores
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
IJTET Journal
 
(Paper Presentation) DSDV
(Paper Presentation) DSDV(Paper Presentation) DSDV
(Paper Presentation) DSDV
Rajesh Piryani
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
Chandra Meena
 
Hj2413101315
Hj2413101315Hj2413101315
Hj2413101315
IJERA Editor
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
ijsrd.com
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ijasuc
 
Network fundamental
Network fundamentalNetwork fundamental
Network fundamental
ashrawi92
 
E010322531
E010322531E010322531
E010322531
IOSR Journals
 
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
ijwmn
 
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
ijwmn
 
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
ijwmn
 
A Hybrid Routing Protocol to Support Mobility in LLNs
A Hybrid Routing Protocol to Support Mobility in LLNsA Hybrid Routing Protocol to Support Mobility in LLNs
A Hybrid Routing Protocol to Support Mobility in LLNs
IRJET Journal
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
ijasuc
 
AUTOCONFIGURATION ALGORITHM FOR A MULTIPLE INTERFACES ADHOC NETWORK RUNNING...
AUTOCONFIGURATION ALGORITHM FOR A  MULTIPLE INTERFACES ADHOC NETWORK  RUNNING...AUTOCONFIGURATION ALGORITHM FOR A  MULTIPLE INTERFACES ADHOC NETWORK  RUNNING...
AUTOCONFIGURATION ALGORITHM FOR A MULTIPLE INTERFACES ADHOC NETWORK RUNNING...
IJCNC
 
Network the 4th layer
Network the 4th layerNetwork the 4th layer
Network the 4th layer
kachbourimed
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Narendra Singh Yadav
 
H01115155
H01115155H01115155
H01115155
IOSR Journals
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
IOSR Journals
 
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksPrediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
IJCNCJournal
 

Similar to IJET-V2I6P7 (20)

A Survey On IP Address Assignment In A Mobile Ad Hoc
A Survey On IP Address Assignment In A Mobile Ad HocA Survey On IP Address Assignment In A Mobile Ad Hoc
A Survey On IP Address Assignment In A Mobile Ad Hoc
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
(Paper Presentation) DSDV
(Paper Presentation) DSDV(Paper Presentation) DSDV
(Paper Presentation) DSDV
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
 
Hj2413101315
Hj2413101315Hj2413101315
Hj2413101315
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
 
Network fundamental
Network fundamentalNetwork fundamental
Network fundamental
 
E010322531
E010322531E010322531
E010322531
 
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
 
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
 
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
 
A Hybrid Routing Protocol to Support Mobility in LLNs
A Hybrid Routing Protocol to Support Mobility in LLNsA Hybrid Routing Protocol to Support Mobility in LLNs
A Hybrid Routing Protocol to Support Mobility in LLNs
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
 
AUTOCONFIGURATION ALGORITHM FOR A MULTIPLE INTERFACES ADHOC NETWORK RUNNING...
AUTOCONFIGURATION ALGORITHM FOR A  MULTIPLE INTERFACES ADHOC NETWORK  RUNNING...AUTOCONFIGURATION ALGORITHM FOR A  MULTIPLE INTERFACES ADHOC NETWORK  RUNNING...
AUTOCONFIGURATION ALGORITHM FOR A MULTIPLE INTERFACES ADHOC NETWORK RUNNING...
 
Network the 4th layer
Network the 4th layerNetwork the 4th layer
Network the 4th layer
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
 
H01115155
H01115155H01115155
H01115155
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
 
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksPrediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
 

More from IJET - International Journal of Engineering and Techniques

healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
IJET - International Journal of Engineering and Techniques
 
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
IJET - International Journal of Engineering and Techniques
 
Ijet v5 i6p18
Ijet v5 i6p18Ijet v5 i6p18
Ijet v5 i6p17
Ijet v5 i6p17Ijet v5 i6p17
Ijet v5 i6p16
Ijet v5 i6p16Ijet v5 i6p16
Ijet v5 i6p15
Ijet v5 i6p15Ijet v5 i6p15
Ijet v5 i6p14
Ijet v5 i6p14Ijet v5 i6p14
Ijet v5 i6p13
Ijet v5 i6p13Ijet v5 i6p13
Ijet v5 i6p12
Ijet v5 i6p12Ijet v5 i6p12
Ijet v5 i6p11
Ijet v5 i6p11Ijet v5 i6p11
Ijet v5 i6p10
Ijet v5 i6p10Ijet v5 i6p10
Ijet v5 i6p2
Ijet v5 i6p2Ijet v5 i6p2
IJET-V3I2P24
IJET-V3I2P24IJET-V3I2P24
IJET-V3I2P23
IJET-V3I2P23IJET-V3I2P23
IJET-V3I2P22
IJET-V3I2P22IJET-V3I2P22
IJET-V3I2P21
IJET-V3I2P21IJET-V3I2P21
IJET-V3I2P20
IJET-V3I2P20IJET-V3I2P20
IJET-V3I2P19
IJET-V3I2P19IJET-V3I2P19
IJET-V3I2P18
IJET-V3I2P18IJET-V3I2P18
IJET-V3I2P17
IJET-V3I2P17IJET-V3I2P17

More from IJET - International Journal of Engineering and Techniques (20)

healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
 
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
 
Ijet v5 i6p18
Ijet v5 i6p18Ijet v5 i6p18
Ijet v5 i6p18
 
Ijet v5 i6p17
Ijet v5 i6p17Ijet v5 i6p17
Ijet v5 i6p17
 
Ijet v5 i6p16
Ijet v5 i6p16Ijet v5 i6p16
Ijet v5 i6p16
 
Ijet v5 i6p15
Ijet v5 i6p15Ijet v5 i6p15
Ijet v5 i6p15
 
Ijet v5 i6p14
Ijet v5 i6p14Ijet v5 i6p14
Ijet v5 i6p14
 
Ijet v5 i6p13
Ijet v5 i6p13Ijet v5 i6p13
Ijet v5 i6p13
 
Ijet v5 i6p12
Ijet v5 i6p12Ijet v5 i6p12
Ijet v5 i6p12
 
Ijet v5 i6p11
Ijet v5 i6p11Ijet v5 i6p11
Ijet v5 i6p11
 
Ijet v5 i6p10
Ijet v5 i6p10Ijet v5 i6p10
Ijet v5 i6p10
 
Ijet v5 i6p2
Ijet v5 i6p2Ijet v5 i6p2
Ijet v5 i6p2
 
IJET-V3I2P24
IJET-V3I2P24IJET-V3I2P24
IJET-V3I2P24
 
IJET-V3I2P23
IJET-V3I2P23IJET-V3I2P23
IJET-V3I2P23
 
IJET-V3I2P22
IJET-V3I2P22IJET-V3I2P22
IJET-V3I2P22
 
IJET-V3I2P21
IJET-V3I2P21IJET-V3I2P21
IJET-V3I2P21
 
IJET-V3I2P20
IJET-V3I2P20IJET-V3I2P20
IJET-V3I2P20
 
IJET-V3I2P19
IJET-V3I2P19IJET-V3I2P19
IJET-V3I2P19
 
IJET-V3I2P18
IJET-V3I2P18IJET-V3I2P18
IJET-V3I2P18
 
IJET-V3I2P17
IJET-V3I2P17IJET-V3I2P17
IJET-V3I2P17
 

Recently uploaded

IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 

Recently uploaded (20)

IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 

IJET-V2I6P7

  • 1. International Journal of Engineering and Techniques - Volume 2 Issue 6, Nov – Dec 2016 ISSN: 2395-1303 http://www.ijetjournal.org Page 45 A study on Optimized Link State Routing Protocol (OLSR),Address Resolution Protocol (ARP) and Dynamic Host Configuration Protocol (DHCP) Satyam Awasthi1 , Soumosir Dutta2 ,Deepanshu Arora3 , Prof. Manikandan K4 School of Computer Engineering ,Vellore Institute of Technology, Vellore, Tamil Nadu I. INTRODUCTION A collection of wireless mobile hosts that are ready to dynamically establish a short lived network with none support from fixed infrastructure is Mobile Ad-hoc Network (MANET). The mobile hosts are connected via wireless links and acts as a router for each other. MANETs finds the simplest way in fields wherever communication infrastructure is pricey and/or time overwhelming. The properties of MANETs that's mobility and absence of infrastructure makes to applicable to operations with time constraints and rescue operations. several analyzers performed research within the space of wireless multi-hop networks by pc simulations and experiments. Most of them aren't targeted on up mobility however throughput was taken care of .A concept of dynamic probabilistic broadcasting scheme for mobile ad-hoc networks was proposed where nodes move according to different mobility models. this idea or approach out performs the FP- AODV (Fixed probability Ad-hoc on-demand Distance Vector) and simple AODV in terms of saved rebroadcast underneath completely different mobility models. It in addition achieves higher saved rebroadcast and low collision in addition as a low range of relays than the fixed probabilistic scheme and straightforward AODV. Being a proactive protocol, routes to all or any destinations inside the network are noted and maintained before use. Having the routes obtainable inside the standard routing table will be helpful for a few systems and network applications as there's no route discovery delay related to finding a brand new route. The routing overhead generated, while usually larger than that of a reactive protocol, doesn't increase with the amount of routes being created. The approach also can be optimized on terms of period provided for the nodes by the protocol and by reducing the topology control overhead. Another approach known as OLSR-L which mixes the routing protocol and location protocol that will increase the strength of the network. II. ROUTING PROTOCOL The OLSR protocol may be a proactive routing protocol, that builds up a route for information transmission by maintaining a routing table within each node of the network. The routing table is computed upon the information of topology info, that is changed by suggests that of Topology control (TC) packets. The TC packets successively square measure designed when each node has crammed its neighbor list. This list contains the identity of neighbor nodes. A node is taken into account as a neighbor if and provided that it are often reached via a bi-directional link. OLSR makes use of hello messages to seek out its one-hop neighbors and its two- hop neighbors through their responses. The sender will then choose its Multi point Relays (MPR) supported the one-hop nodes which supply the most effective routes to the two-hop nodes. during this approach, the quantity of management traffic are often reduced. every node has conjointly AN MPR selector set that enumerates nodes that have chosen it as an MPR node. OLSR uses TC messages beside MPR forwarding to disperse neighbor info throughout the network. Packet loss is usually computed at higher layers than routing one. However, AN estimate of the packet loss is required by OLSR so as to assign a weight or a state to each link. Host Network Address (HNA) messages square measure employed by OLSR to disperse network route advertisements within the same approach that TC messages advertise host routes. each node computes the trail toward a destination by suggests that of a simple shortest-path algorithmic program, with hop-count as target metric. during this approach, a shortest path may end up to be conjointly not smart, from the purpose of read of the packet error rate. consequently, recently olsrd has been RESEARCH ARTICLE OPEN ACCESS Abstract: A Mobile Ad-hoc network is a set of mobile terminals moving in different directions at different speed being wirelessly connected to each-other. In this paper we study the proactive Link State Routing Protocol – OLSR, which uses hello and topology control (TC) messages to find then distribute link state data throughout the mobile ad hoc network. Individual nodes use this topology data to calculate next hop destinations for all nodes within the network using shortest hop forwarding paths. We then suggest ways by which the existing algorithm can be optimized in terms of delay, throughput, power consumption, jitter etc. Finally we summarize the applications of OLSR.
  • 2. International Journal of Engineering and Techniques - Volume 2 Issue 6, Nov – Dec 2016 ISSN: 2395-1303 http://www.ijetjournal.org Page 46 equipped with the LQ extension, that may be a shortest-path algorithmic program with the typical of the packet error rate as metric. This metric is usually referred to as because the ETX, that is outlined as ETX(i) = 1/(NI(i) × LQI(i)). Given a sampling window W , NI(i) is the packet arrival rate seen by a node on the i-th link during W . Similarly, LQI(i) is the estimation of the packet arrival rate seen by the neighbor node which uses the i-th link. When the link has a low packet error rate, the ETX metric is higher. The LQ extension greatly enhances the packet delivery ratio with respect to the hysteresis-based technique. III. ADDRESS RESOLUTION PROTOCOL ADDRESS RESOLUTION PROTOCOL or ARP is used to establish connection between nodes or hosts of the same network and hence means a communication between them. After every hosts gets it’s IP address assigned by DHCP or Dynamic Host Configuration Protocol, its being connected by switch to other nodes. The switch being a layer 2 device has MAC address table which has a room for MAC address along with port number, initially empty. Each node has a ARP cache which maintains IP address with corresponding MAC Address of the hosts, its being connected to sometime. Initially it is also empty. For intra-network message passing , the Source has its own Source MAC generated from NIC and its own IP address known. The destination IP address is known for communication but MAC is unknown hence a broadcast MAC address is being assigned as destination address i.e ff::ff::ff::ff::ff::ff and the packet is forwarded to the switch. The switch on receiving broadcast MAC broadcast the message to all other nodes in the network and simultaneously updating its MAC address table with Port Number of Source in switch and corresponding address. Every other node receives the address and matches it with its own IP address. In case of mismatch the packet is dropped but if the IP matches then the destination send a reply with its MAC address and IP address. The switch on receiving the reply updates its MAC table with port number and hosts information about its address. The reply is hence forwarded to the source matching the port number from earlier updated table. After receiving the reply , the original hosts updates its ARP cache for further reference and communication, now a smoother communication can be done as every other thing is known. On connection reset the ARP cache is reset along with the MAC address table information is lost and again we need to perform ARP for connection establishment. If the switch encounters a destination IP other than its network address or network address of the network, then it is redirected to the nearest gateway for internetwork communication. IV. DYNAMIC HOST CONFIGURATION PROTOCOL With the increasing number of internet users, there is a need of efficiently assigning IP address to each node in a network. Manually assigning will cause time delay and wastage of IP addresses. Hence a solution is DHCP which has four fundamental steps in doing operation. The acronym DORA can be used to remember the steps well. D for Discovery is a process where the node or host which try to enter the network has its source IP address as 0.0.0.0 initially and destination IP and MAC as 255.255.255.255 and ff::ff::ff::ff::ff::ff. Source MAC is its own MAC address from NIC.A discovery packet is being broadcasted and reaches the DHCP server. Other intermediate nodes discards it. The DHCP server has a port of address in it with same network address. It picks up the first unassigned IP address and hence the second step OFFER i.e. the IP address is broadcasted back to the source. The source on receiving the offers IP address accepts it and REQUEST message id being sent back that it would like to keep the IP address. A acknowledgement packet is the send by unicast to the host and hence the IP is being assigned. Now the IP address is used for both internetwork communication and intranetworking. Once the node is reset or disconnected the IP address assigned is free and the DHCP server pool has a IP address now available and allocated the freed IP to some othe node who has demanded it. In real scenario, often there are more than one DHCP servers hence the second step OFFER is a broadcast message that is the node can receive many offers from DHCPs but will choose one and discard others, hence for 3rd step , Request there is communicating with the DHCP server chosen and the rest which are not chosen. V. APPLICATION For MANETS the performance of a protocol is coupled with a wide variety of issues mainly physical layer technology, link layer capacity etc and this is because of its' inherent wireless nature. The overall strengths of a routing protocol specifies which domain it could be used in. OLSR a proactive or table driven protocol is used in areas where this access to stored information favors the scenario and new route requests are quite frequent. The protocol also goes in where long delay in packet transmission is not allowable. OLSR is adopted in scenarios where the nodes are dense and communication can be expected to occur between a large numbers of nodes quite frequently. VI. CONCLUSION OLSR as we have seen is best for situations of dense network topology, a system that guarantees high packet delivery ratio in such situations. Still we have seen it can be improved in various ways as stated in topology control methods, OLSR-L and BATMAN network routing protocols. Acknowledgment We are extremely grateful to professors of Computer Engineering,VIT University, Vellore for the support in our
  • 3. International Journal of Engineering and Techniques - Volume 2 Issue 6, Nov – Dec 2016 ISSN: 2395-1303 http://www.ijetjournal.org Page 47 learning of network simulation. I would also like to grab this opportunity to thank Professor Manikandan K. for his constant guidance and help without which this paper would not have been successful. References [1] Hiroshi Mineno, Kazuyoshi Soga, Tomoya Takenaka, Yoshiaki Terashima, Tadanori Mizuno, “Integrated protocol for optimized link state routing and localization:OLSR-L”, Simulation Modelling Practice and Theory(2011). [2] Elis Kulla,Masahiro Hiyama, Makoto Ikeda, Leonard Barolli , “Performance comparison of OLSR and BATMAN routing protocol by a MANET testbed in stairs enviorment”, Computers and Mathematics with Applications. [3] Abdelali Boushaba, Adil Benabbou, Rachid Benabbou,Azeddine Zahi, Mohammed Oumsis ,"Multi-point relay selection strategies to reduce topology control traffic for OLSR protocol in MANETs", Journal of Network and Computer Applications (2015). [4] Jan-Maarten Verbree, Maurits de Graaf, Johann Hurink,"An analysis of the lifetime of OLSR networks", Ad Hoc Networks(2010). [5] Anand Dersingh, Z.M. Faizul Islam, Shahram Shah Heydari, Md. Mustafizur Rahman , "OLSR-based Topology Discovery for Mobile Situational Awareness Systems " [6] S. Mohapatra, P.Kanungo, "Performance analysis of AODV, DSR, OLSR and DSDV Routing Protocols using NS2 Simulator", Procedia Engineering (2012). [7] Zhihao Guo, Shahdi Malakooti, Shaya Sheikh, Camelia Al-Najjar, Behnam Malakooti, "Multi-objective OLSR for proactive routing in MANET with delay, energy, and link lifetime predictions", Applied Mathematical Modelling(2011).