SlideShare a Scribd company logo
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 10, No. 1, February 2020, pp. 288~295
ISSN: 2088-8708, DOI: 10.11591/ijece.v10i1.pp288-295  288
Journal homepage: http://ijece.iaescore.com/index.php/IJECE
Improving the selection of MPRs in OLSR protocol: a survey of
methods and techniques
Omar Barki1
, Zouhair Guennoun2
, Adnane Addaim3
1,2
Smart Communications, E3S Research Center, EMI, Mohammed V University, Morocco
3
ISET Laboratory, ENSA, Ibn Tofail University, Morocco
Article Info ABSTRACT
Article history:
Received Jan 30, 2019
Revised Jul 26, 2019
Accepted Aug 29, 2019
Multi Point Relays (MPRs) are those nodes that are calculated and
determined by the Optimized Link State Routing protocol (OLSR) in order to
minimize and avoid overload inside the Mobile Ad hoc Network (MANET).
In this paper, we will present a synthetic study of many techniques and
methods for calculating and selecting the MPR nodes using a set of criteria
namely energy, mobility, bandwidth, the quality of links, etc. The result of
this study shows that most techniques consider a limited number of metrics
for selecting the MPR nodes and therefore they are insufficient to allow the
OLSR protocol to be quite complete and efficient because several metrics
can occur at the same time in the real execution environment.
Keywords:
MANET
MPR
OLSR
Wireless network
Copyright © 2020 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Omar Barki,
Smart Communications (ERSC), Ecole Mohammadia d’ingenieur,
Mohammed V University, Rabat.
Avenue Ibn Sina BP765 Agdal, Rabat, Morocco.
Email: obarkiomar@gmail.com
1. INTRODUCTION
The OLSR (Optimized Link State Routing) is a proactive routing protocol dedicated to MANET
networks (Mobile Ad hoc Network) for establishing paths between network nodes. The routing process of
this protocol is mainly based on the MPR (Multi Point Relay) selection technique in order to reduce
the traffic load of the network and also to minimize the path to the destination [1, 2]. the MPRs search
procedure launched by the NPC (Node Performing the Computation) makes it possible to detect a set of
nodes able to transmit its messages and its data to other nodes far from its range and therefore cover
the entire network. The computation of the MPR by the standard algorithm RFC3626 [3] presented below
remains basic and insufficient because it does not take into account all the characteristics of the node and
the network, for a thorough study of this problem we compared several approaches proposed by researchers
in order to improve the quality of service [4, 5] and security level [6, 7] of this protocol against attacks [8, 9].
In the next section, we will present a brief description of a set of OLSR improved versions and
approaches especially the MPRs selection technique, then in the third section, we will draw up a summary
table of the comparative study and finally, we will conclude our study by analyzing the obtained results.
2. IMPROVED VERSIONS OF THE OLSR PROTOCOL (MPR)
In this section, we will present a brief description of some techniques used for improving MPR
selection algorithm in order to reduce the number of transmitted messages, optimize data transfer time
between source and destination nodes and also to reduce the energy consumption for increasing the lifetime
of the network.
Int J Elec & Comp Eng ISSN: 2088-8708 
Improving the selection of MPRs in OLSR protocol: a survey of methods and techniques (Omar Barki)
289
2.1. OLSR
According to RFC3626 [3], the technique used to calculate these MPRs is based on the symmetrical
connections between the NPC node and its first and second neighbor nodes, is given by the following
algorithm:
N : The subset of the node’s neighbors, which are neighbors of the interface I.
N2 : The set of 2-hop neighbors reachable from the interface I, excluding:
a. the nodes only reachable by members of N with willingness WILL_NEVER
b. the node performing the computation
c. all the symmetric neighbors: the nodes for which a symmetric link to this node exists on
some interface.
D(y) : The degree of a 1-hop neighbor node y (where y is a member of N), is defined as the number of
symmetric neighbors of node y, EXCLUDING all members of N and EXCLUDING the node performing
the computation.
The proposed heuristic is as follows:
1. Start with an MPR set made of all members of N with N_willingness equal to WILL_ALWAYS
2. Calculate D(y), where y is a member of N for all nodes in N.
3. Add to the MPR set those nodes in N, which are the only nodes to provide reachability to a node in N2.
For example, if node b in N2 can be reached only through a symmetric link to node a in N, then add node
a to the MPR set. Remove the nodes from N2 which are now covered by a node in the MPR set.
4. If there are nodes in N2 which are not covered by at least one node in the MPR set :
a. For each node in N, we calculate the reachability, i.e., the number of nodes in N2 which are not yet
covered by at least one node in the MPR set, and which are reachable through this 1-hop neighbor;
b. We select as a MPR the node with highest N_willingness among the nodes in N with non-zero
reachability. In case of multiple choices, we select the node which provides reachability to
the maximum number of nodes in N2. In case of multiple nodes providing the same amount of
reachability, we select the MPR node as the one where D(y) is greater. Remove the nodes from N2
which are now covered by a node in the MPR set.
2.2. L-OLSR
In this version [10], the MPR selection algorithm takes into account the angle between two lines :
the line composed of NPC node and node with the highest accessibility level noted: NA and the line
composed of NPC node and candidate node for MPR noted: NC. If the angle is close to 90, 180 or 270,
this node is considered MPR for the NPC node. The calculation of the NC-NPC-NA angle is made from
the distances NPC-NA, NPC-NC and NA-NC (determined from the coordinates of each node) by
the following formula:
x = arcos ([(NPC -NA) 2 + (NPC-NC) 2 - (NA-NC) 2] / 2 * NA-NC)
The result of the simulation on NS3 shows that the number of packets sent by standard OLSR is
large compared to the number sent by L-OLSR but the number of packets received is almost the same for
both OLSR versions, hence the number of lost packets for L-OLSR is minimal compared to OLSR. finally,
the proposed L-OLSR approach (based on locating nodes for the selection of MPRs) is more efficient in
terms of PDR, and therefore it improves the ability to transmit messages and data.
2.3. BW-OLSR
This is a modified version of the RFC3626 MPR Selection Algorithm (SA MPR) in which
the authors added the bandwidth as a parameter to consider for path computation between the source and
destination node [11]. The path to take among the possible paths computed by OLSR via the MPRs of
the NPC node is the one which contains the maximum of the nodes which have a wider bandwidth without
this path necessarily being the shortest. The simulation carried out on OPNET for both versions OLSR and
BW-OLSR showed that the latter presented a number of MPRs greater than that calculated by OLSR and
consequently a significant increase in rate in the network.
2.4. DF-OLSR
According to [12], the authors have tried to improve MPRs selection in terms of energy
consumption and at the same time to secure it against nodes that are suspicious by isolating them from
the rest of the network. The proposed algorithm is based on the exchange of three new messages namely:
VOTEFOR and VOTERPL which mark every time the sequence of nodes N1 (1st neighborhood) by nodes
N2 (2nd neighborhood) accessible by the nodes of N1. The nodes of N1 having the highest number of votes
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 288 - 295
290
(VOTERPL maximum) is considered as MPR. The third message “INFO” is sent to N2 nodes to inform them
of their MPR. This approach allowed reducing the energy consumption and quickly detecting the nodes using
DOS to attack the network.
2.5. IOLSR
The idea is to detect malicious nodes by using the number of HELLO messages sent, then block
them for some time [13]. The solution consists in determining a threshold of number of Hello messages sent
per unit of time knowing that the periodicity of this message is fixed at 2 seconds. Indeed, if the calculated
number is higher than the normal value then the node is considered suspicious and it is blocked for a certain
time. This approach helps reduce congestion in the network and prevent malicious nodes.
2.6. PB-OLSR
The objective of the PB-OLSR (Performance Based OLSR) is to improve exchanges and services in
the MANET network via MPRs that are more efficient and less energy-consuming by relying on
a measurement model of the performance and confidence level of each node [14]. Indeed, firstly for
the computation of the node performance, the author used the Multi Creteria Decision Analysis (MCDA)
method and ROC (Rank Order Centroid) precisely on a set of criteria of this node (residual energy, RAM,
CPU , ....) in order to determine the weight of each of these metrics. Secondly, to evaluate the trust of
the node, he used an algorithm that relies on HELLO, TC messages and data messages routed through this
node using the ROC technique to calculate the weight of each message. When receiving control messages or
data messages, the algorithm increments the confidence value associated to the node. If a malicious behavior
is detected, the algorithm will decrement the confidence value. The result of the simulation on NS3 has been
shown that this approach allows:
a. Reducing the impact of malicious nodes by calculating trust.
b. Reducing the broadcast traffic in the network
c. Maximizing the routing lifetime by avoiding nodes with poor performance being elected as MPRs.
2.7. EM-OLSR
The selection of MPRs by the OLSR protocol is reinforced in this approach by calculating the value
of the Willingness parameter from two metrics, namely the energy and mobility of the node [15]. Each node
calculates its residual energy and its moving speed (supposing that each node is equipped with GPS to
determine its coordinates) and it deduces from it the value of Willingness which can be willigness_default,
willigness_low or willigness_high according to the result of the following algorithm:
if ( lifetime > energy_threshold && mobility_speed > mobility_threshol or energy < energy_threshold
&& mobility_speed < mobility_threshold )
willingness = willigness_default
if ( energy < energy_threshold && mobility_speed > mobility_threshold)
willingness = willigness_low
if ( energy > energy_threshold && mobility_speed < mobility_threshold)
willingness = willigness_high;
end.
The result of the simulation performed on NS2 simulator shows that the EM-OLSR version
gives better results compared to the OLSR standard protocol in terms of throughput, lost packets and
energy consumption.
2.8. W-OLSR
W-OLSR [16] is an OLSR standard extension in which the author has added for the selection of
MPRs another parameter called Weihgted-MPR calculated from Residual Energy, Signal Strength and
Transmission delay by the following formula:
Weighted MPR= X * Residual Energy + Y * Signal Strength – Z * Transmission delay
Where X, Y and Z are constants, if Weighted MPR <= weight_threshold then the node is considered MPR.
At the source node the HELLO message is sent with the value of the residual energy and transmission time,
and in reception the quality of this link (bad or good) is determined by measuring the residual energy, delay
of transmission (sending time and current times) and the signal strength. The comparison of OLSR standard
Int J Elec & Comp Eng ISSN: 2088-8708 
Improving the selection of MPRs in OLSR protocol: a survey of methods and techniques (Omar Barki)
291
with W-OLSR showed that the latter is more efficient compared to OLSR in terms of throughput and number
of lost packets (PDR).
2.9. EOLSR, EOLSR-EC, EOLSR-RE
According to [17], to guarantee a long MANET network lifetime, the OLSR version is reinforced by
the addition of energy metric that produce the EOLSR (OLSR for energy consumption) version, which has
made it possible to minimize the energy consumption and optimize the data transfer path calculation by
modifying the HELLO and TC message formats by adding two types of parameters namely residual energy
(RE) and consumed energy(EC), thus two versions for EOLSR have been established namely EOLSR-RE
and EOLSR-EC. This approach consists in setting the thresholds of RE and EC and checking the following
test: If the residual energy of the node is lower than the threshold value, the node is set to LOW-MPR-WILL,
otherwise it is HIGH-MPR-WILL. And if the energy consumed by the node is less than the threshold value,
the node takes the value HIGH-MPR-WILL otherwise it takes the value LOW-MPR-WILL.
From the simulation result of this approach, the author noticed that the OLSR-RE is the best protocol in
terms of energy efficiency compared to EOLSR-EC and OLSR.
2.10. M-OLSR
OLSR is modified so that each node in the network can choose its strategy of "Update" or "Not
update" the HELLO and TC messages in order to minimize the cost of path to borrow in terms of number of
jump and energy [18]. This technique depends on the energy capacity of the intermediate nodes, if it reaches
the threshold (given by the user), then it chooses another path. The evaluation of the performance of this
approach is performed using various parameters namely “end to end delay”, “overhead routing” and “residual
energy”. The results obtained from this simulation show that the proposed MOLSR algorithm offers
a significant reduction of load of messages in the network and the energy consumption and also it presents
a small reduction in the average throughput.
2.11. OLSR-ETX-ML-MD
The author tried to compare the three versions of OLSR, namely ETX, ML and MD [19], knowing
that: OLSR-ETX is based on the link quality in terms of sending and receiving HELLO messages,
by the probability calculation (number of messages sent by X to Y / number of messages received by Y from
X) for each node and the formula ETX is given by: ETX = 1 / P (X) * P (Y). So, for choosing the shortest
path, we consider the path which has the sum of the smallest ETX.
OLSR-ML is the basis for calculating ETX. This is the product called PLINK = P (X) * P (Y),
finds the link where the number of lost packets is smaller. OLSR-MD is based on the measurement of
transmission delay between the nodes calculated from the routing table. The shortest path is the path for
which the delay is smaller. The comparison of this version has shown that OLSR-ETX gives more
satisfaction in terms of evaluation parameters (end-to-end delay, Throughput ...).
2.12. MOB-2--OLSR
The proposed Mob-2-OLSR protocol is an improvement on the two previous versions: OLSR and
Mob-OLSR in order to limit the effects produced by the mobility of neighboring nodes and reduce the rate of
packet loss and the value "End-to-end delay" [20]. For this purpose, the authors introduce metrics that
calculate the mobility of neighboring nodes in the process used for the selection of MPR by giving priority to
less mobile candidates. The proposed protocol Mob-2-OLSR provided, in most cases, the best results in
terms of PDR, delay and throughput compared to other versions.
2.13. EDCR-OLSR
According to [21], the authors took advantage of the idea used in the latest generation of
microprocessors. Instead of using a single processor with high execution speed and thus highpower
consumption, it would be preferable to use the processor with several cores in the same chip with an overall
speed equivalent to the first processor and whose Energy consumption is reduced. Thus, by applying this idea
to the OLSR protocol, the retransmission traffic control task is distributed over several MPRs. As results of
this technique, the authors remarked a gain in terms of energy consumption and packet loss ratio.
2.14. OLSR-AAD
The technique proposed in [22] consists in allowing each node the possibility to keep the maximum
possible MPR. The authors have changed the order of selection of MPRs so that they introduce a new metric
"Average Age of Death" based on the lifetime of the node already selected as MPR which depends on several
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 288 - 295
292
criteria ie (Node mobility, network density, etc.). This approach was satisfactory in terms of PDR, delay and
throughput.
2.15. EEPR-OLSR
In the article [23], the author tries to improve the MANET network lifetime by maintaining routing
path availability and minimizing power consumption in the OLSR protocol. The upgrade version is called
EEPR_OLSR, it has presented significant results compared to standard OLSR. The author used GPS to
retrieve information on the nodes in order to calculate the most stable path by Link Expiration Time (LET)
giving by this formula:
( )
( ) √( ) ( )
where
,
.
For this EEPR_OLSR version, the simulation on NS3 has given a high PDR and life time results
compared to OLSR Standard.
2.16. EEM-OLSR
The main idea given by the authors of the article [24] is to use the technique of energy efficiency
by choosing the shortest available path. Otherwise, we take the other shortest available alternative path in
the case where the first path goes down. For this reason, the authors have modified the structure of
the routing table by adding information that records the different paths from the same source to the same
destination from the topology table. The comparison of this new version of OLSR with the OLSR standard,
according to the parameters namely Throughput, Packet Delivery Ratio, Energy Efficiency, Normalized
Routing load and End-to-End Delay, has shown that this approach has presented a significant optimization in
terms of time and energy.
2.17. DCFM-OLSR
The author has attempted to use the Denial Contradictions with Fictitious Node Mechanism
(DCFM) technique to address possible attacks on OLSR protocol performance [25]. This technique is based
on the same strategy followed by the attack itself in order to avoid it. It creates virtual nodes and uses data
from the victim node to protect the network. The result of the proposed approach shows that it avoids a large
number of attacks and therefore a more reliable data exchange could be set up between nodes.
2.18. OPE-OLSR
In the paper [26], the authors proposed a new routing approach in the OLSR protocol based on
the energy consumption for selecting the MPR nodes in order to increase the lifetime of the MANET
network. The main idea is to try to privilege the nodes in N1 having higher energy to be an MPR because
the MPR node consumes more energy than other non-MPR nodes. If several nodes have the same value of
energy, we choose the MPR node which covers more nodes in N2. The proposed algorithm is as follow:
a. Let assume X is a node which wants to compute MPR set. N1 is a set of X’s 1-hop neighborhood and N2
is a set of X’s 2-hop neighborhood.
b. If (Set N1 is empty)
{Wait until topology changes Goto step 1}
Else
{
If (Are there two or more nodes offering the same maximum energy)
{Select node i in N1 which covers maximum nodes
(highest degree) in N2
}
Else {Select node i which has highest Energy}
}
c. Node in N2 has symmetric link with node i of N1
Int J Elec & Comp Eng ISSN: 2088-8708 
Improving the selection of MPRs in OLSR protocol: a survey of methods and techniques (Omar Barki)
293
d. Choose node i in N1 as MPR
e. Delete the nodes of N2 which are
symmetrically connected with node i in N1
f. If (Set N2 is empty)
{S: MPR Set of X}
Else
{Consider node i in N1 which has Max Energy and not yet considered as MPR
Remaining nodes in N2 has symmetric link with
node i of N1
Goto step 4.}
3. STUDY AND RESULTS
The different optimization approaches of calculation of the MPR are cited in Table 1. The study of
those approaches allowed us to note the following remarks:
a. Most approaches have focused on energy in comparison to other parameters (Mobility, security,
bandwidth).
b. Most approaches deal with one, two or three parameters at a time without taking into account the impact
of the others.
c. The consideration of the characteristics of the material is almost null in the studies carried out by
the authors.
d. We also note the absence of mathematical models in several studies approaches
e. The changes made by the authors are often done on the algorithm of selection of the MPRs and
the formats of messages HELLO and TC.
f. The study of the dependence between the parameters is not taken into account, knowing that the change
of one parameter can affect the others.
g. The most common type of mobility used in the simulation is Random Way Point compared to Random
Direction, Manhattan Grid, Freeway Point and others.
h. The simulations were performed with NS2 tool compared to NS3.
i. Lack of the reaction study of this protocol by acting on several parameters at a same time.
Table 1. Comparison between MPR selection approaches based on the authors focuses axes
Energy
Bandwith
Mobility
Node
Geometric
informatio
n
Simulator
Path(Link)
Security
Hello
Tc
Hard/Soft
Mobility
type
Math.
Model
Control
overhead
Lifetime
Of
OLSR X X X S RWP
L-OLSR X NS3 X S
RD2dM
M
BW-OLSR X OPNET X S X
DF-OLSR X X S
IOLSR X X X S RWP
PB-OLSR NS2 X X X X H, S RWP MCDA
EM-OLSR X X GPS NS2 X X
RWP,
MG, FP
EOLSR-EC X X X X S RWP
W-OLSR X X X X S RWP X
MOLSR X NS3 X X X S X
OLSR-ML X NS2 X X S X
OLSR-MD X NS2 X X S X
OLSR-ETX X NS2 X X S X
MOB-2-
OLSR
X NS2 X S RWP
EDCR-
OLSR
X NS2 X S RWP
OLSR-
AAD
NS2 X S RWP MPR
EEPR-
OLSR
X GPS NS3 X S
R.Walk-
based
X Network
EEM-OLSR X NS2 X X X S R.D X
DCFM-
OLSR
X X X S X
OPE-OLSR X NS2 X S Network
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 288 - 295
294
4. CONCLUSION
In this article, we have attempted to present a survey study of a set of approaches and techniques
concerning the changes made to the OLSR protocol for improving the MPR selection technique and for
maintaining the life time of the network as long as possible by allowing the network nodes more reliable
exchanged data. This survey made it possible to know the impact of metrics to select the MPR nodes and
calculate an optimal path from source node to destination node. Also, this survey allows knowing
the orientations of the researchers and their concerns. Finally, in this article, we have given a set of remarks
on the OLSR protocol execution environment that can open new research subject and new innovative ideas in
this field.
REFERENCES
[1] O. Barki, et al., “Formal verification of MPR selection algorithm in the OLSR protocol,” 10th International
Conference, Intelligent Systems: Theories and Applications (SITA), pp. 1-5, 2015.
[2] O. Barki, et al., “Comparative study of MPR selection algorithms based on Statistical Model Checking,” 5th
International Conference on Multimedia Computing and Systems (ICMCS'16), IEEE Conference, 2016.
[3] T. Clausen and P. Jacquet, “Optimized Link State Routing Protocol (OLSR),” Project Hipercom, INRIA, RFC3626,
2003.
[4] Alamsyah, et al., “MPR selection to the OLSR quality of service in MANET using minmax algorithm,”
International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 1, pp. 417-425, 2019.
[5] S. Sahu and S. Sharma, “Secure and proficient cross layer (SPCL) QoS framework for mobile ad-hoc network,”
International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 4, pp. 2603-2613, 2019.
[6] A. Ahmad and S. Ismail, “User Selective Encryption Method for Securing MANETs,” International Journal of
Electrical and Computer Engineering (IJECE), vol. 8, no. 5, pp. 3103-3111, 2018.
[7] K. R. Rao, et al., “An Effective Data Privacy Mechanism through Secure Session Key Exchange Model
for MANET,” International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 5,
pp. 3267-3277, 2018.
[8] Y. Khamayseh, et al., “Intelligent black hole detection in mobile AdHoc networks,” International Journal of
Electrical and Computer Engineering (IJECE), vol. 9, no. 3, pp. 1968-1977, 2019.
[9] N. Panda and B. K. Pattanayak, “Analysis of Blackhole Attack in AODV and DSR,” International Journal of
Electrical and Computer Engineering (IJECE), vol. 8, no. 5, pp. 3092-3102, 2018.
[10] W. Anbao and Z. Bin, “Improving MPR Selection Algorithm in OLSR Protocol Based on Node Localization
Technology,” Journal of networks, vol. 9, 2014.
[11] D. Moad, et al., “Improving the Quality of Service Routing in OLSR Protocol,” International Conference
Communications and Information Technology (ICCIT), 2012.
[12] G. Ezhilarasi, et al., “Improving MPR selection algorithm in olsr Protocol based on dos free transmission
in MANET MPR selection process,” International Journal of Technology and Engineering System (IJTES), vol 7,
pp. 239-243, 2015.
[13] J. Bavaliya, et al., “An Improved OLSR Protocol IOLSR to Detect and Prevent Flood Attack over MANET,”
IJESC, vol. 6, 2016.
[14] M. Dyabi, et al., “PB-OLSR: Performance Based OLSR,” IJCSNS International Journal of Computer Science and
Network Security, vol. 15, 2015.
[15] L. Fatima and E. Najib, “Energy and mobility in OLSR routing protocol,” Cyber Journals: Multidisciplinary
Journals in Science and Technology, (JSAT), 2012.
[16] L. S. Anandrao and J. Y. Amey, “Comparison of OLSR and Energy Conserved OLSR,” International Journal of
Technical Research and Applications, vol. 2, pp. 05-08, 2014.
[17] Mohit and S. Pal, “Stable MPR Selection in OLSR for Mobile Ad-Hoc Networks,” (IJCSIT) International Journal
of Computer Science and Information Technologies, vol. 6, pp. 5121-5125, 2015.
[18] A. K. Jaiswal and S. Tiwari, “Modified OLSR (MOLSR) Protocol for improving optimal route selection with
Dynamic MPR selection in Mobile Adhoc Network,” IJSRSET, vol. 1, 2015.
[19] A. Pandey and M. Baliyan, “Performance Analysis of OLSR and Modified Version of OLSR-ETX/MD/ML in
Mesh Networks,” International Journal of Computer Science & Communication Networks, vol. 2, pp. 268-271.
[20] A. Ouacha, et al., “OLSR protocol enhancement through mobility integration,” 10th IEEE International
Conference in Networking, Sensing and Control (ICNSC), pp. 17-22, 2013.
[21] A. Ouacha, et al., “Proactive routing based distributed energy consumption,” Intelligent Systems: Theories and
Applications (SITA), 2013 8th International Conference on, pp. 1-5, 2013.
[22] A. Ouacha, et al., “New Mobility Metric based on MultiPoint Relay Life Duration,” presented at the Proceedings
of the International Conference on Signal Processing and Multimedia Applications and Wireless Information
Networks and Systems, Rome, Italy, 2012.
[23] A. Sahnoun, et al., “EEPR-OLSR: An Energy Efficient and Path Reliability Protocol for Proactive Mobile Ad-hoc
Network Routing,” International Journal of Communication Networks and Information Security (IJCNIS),
vol. 9, 2017.
[24] S. M. Chauhan and A. M. Lathigara, “Energy Efficient Multipath OLSR in Mobile Adhoc Networks,” International
Research Journal of Engineering and Technology (IRJET), vol. 03, 2016.
Int J Elec & Comp Eng ISSN: 2088-8708 
Improving the selection of MPRs in OLSR protocol: a survey of methods and techniques (Omar Barki)
295
[25] V. I. U. Rani and K. T. Reddy, “To Improve the Security of OLSR Routing Protocol Based on Local Detection of
Link Spoofing,” International Journal of Science Engineering Technology, IJSEAT, vol. 5, 2017.
[26] S. Prajapati, et al., “Optimizing Performance of OLSR Protocol Using Energy Based MPR Selection in MANET,”
2015 Fifth International Conference on Communication Systems and Network Technologies, 2015.
BIOGRAPHIES OF AUTHORS
Omar Barki, PhD student in Research Team in Smart Communications - ERSC, E3S
Research Center, EMI, Mohammed V University in Rabat, Morocco. He was born in
ERRACHIDIA, Morocco in 1975.He received his MST degree in Software Engineering in
Sciences and technologies Faculty in 1998,and his Advanced graduate degree in informatics
and Telecommunications from Faculty of Sciences of Rabat in 2008, His fields of interest are
networks architecture and wireless sensor network.
Zouhair Guennoun, Research Team in Smart Communications - ERSC, E3S Research
Center, EMI, Mohammed V University in Rabat, Morocco. Zouhair Guennoun was born in
Fès, Morocco in 1964. He received his engineering degree in Electronics and
Telecommunications from the Electronics and Electrical Montefiore Institute, ULG Liege,
Belgium in 1987; his M.Sc. degree in Communication Systems from the EMI School of
Engineering, Rabat, Morocco in 1993; and his PhD degree from the same school in 1996. He
visited the Centre for Communication Research (CCR) in Bristol University, UK, during the
period of 1990-1994 to prepare a split PhD. His fields of interest are digital signal processing,
error control coding, speech and image processing, telecommunication systems, networks
architecture and networks security. Prof. Guennoun is an IEEE senior member (member since
1990); and ex-member of the Moroccan IEEE section executive committee. During 1988-1996
he worked as an Assistant Lecturer in the EMI School of engineering, and from 1996 he is
working in the same school as a Professor Lecturer. Currently, he is in charge of the research
team of Smart Communications – ERSC (formerly known as LEC) as part of the research
center in engineering sustainable and smart systems at EMI, University Mohammed V in
Rabat.
Adnane Addaim. He received his master diploma in 2001 and his Ph.D. degree in 2008,
both in satellite communication from Mohammadia School of Engineers (EMI), Morocco.
From 2002 to 2003, he was employed at SIEMENS.AG, as Transmission Engineer,
responsible of the implementation of the supervision network of the Meditelecom GSM
Network, in Morocco. From 2004 to 2009, he was teaching assistant at EMI and research
engineer at Centre for Space Research and Studies (CRES, EMI) working on research projects
dealing with the design of university microsatellite. He is recipient of the first prize of the
2007-2009 best PhD thesis in the field of Sciences and technologies at Mohammed V
university. From Mars to August 2010, he was with post-doctoral scholarship at the Satellite
Communication and Networking Laboratory (SCNL) at the faculty of engineering, University
of Genoa. From 2010 to 2014, he has been Assistant Professor at the ENSA Engineering
school kenitra, Morocco. From 2015, he has been an associate professor at the same school.
His current research interests include signal processing, communication networks and satellite
communication systems.

More Related Content

What's hot

J1803056876
J1803056876J1803056876
J1803056876
IOSR Journals
 
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETProviding A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Editor IJCATR
 
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networks
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networksFlbra fuzzy logic based routing algorithm for indoor wireless sensor networks
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networks
ijcsit
 
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Narendra Singh Yadav
 
MAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio NetworksMAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio Networks
Polytechnique Montreal
 
Efficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided RoutingEfficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided Routing
IOSR Journals
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
Packet Loss and Overlay Size Aware Broadcast in the Kademlia P2P System
Packet Loss and Overlay Size Aware Broadcast in the Kademlia P2P SystemPacket Loss and Overlay Size Aware Broadcast in the Kademlia P2P System
Packet Loss and Overlay Size Aware Broadcast in the Kademlia P2P System
IDES Editor
 
Paper id 252014153
Paper id 252014153Paper id 252014153
Paper id 252014153
IJRAT
 
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
cscpconf
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black hole
ijasa
 
Paper id 42201621
Paper id 42201621Paper id 42201621
Paper id 42201621
IJRAT
 
Fuzzy Optimized Metric for Adaptive Network Routing
Fuzzy Optimized Metric for Adaptive Network RoutingFuzzy Optimized Metric for Adaptive Network Routing
Fuzzy Optimized Metric for Adaptive Network Routing
CSCJournals
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
IJCI JOURNAL
 
Minimum distance based routing protocol for lifetime improvement in wireless ...
Minimum distance based routing protocol for lifetime improvement in wireless ...Minimum distance based routing protocol for lifetime improvement in wireless ...
Minimum distance based routing protocol for lifetime improvement in wireless ...
eSAT Journals
 
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
ijngnjournal
 

What's hot (18)

J1803056876
J1803056876J1803056876
J1803056876
 
I046054549
I046054549I046054549
I046054549
 
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETProviding A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
 
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networks
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networksFlbra fuzzy logic based routing algorithm for indoor wireless sensor networks
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networks
 
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
 
MAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio NetworksMAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio Networks
 
Aa35152156
Aa35152156Aa35152156
Aa35152156
 
Efficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided RoutingEfficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided Routing
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
Packet Loss and Overlay Size Aware Broadcast in the Kademlia P2P System
Packet Loss and Overlay Size Aware Broadcast in the Kademlia P2P SystemPacket Loss and Overlay Size Aware Broadcast in the Kademlia P2P System
Packet Loss and Overlay Size Aware Broadcast in the Kademlia P2P System
 
Paper id 252014153
Paper id 252014153Paper id 252014153
Paper id 252014153
 
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black hole
 
Paper id 42201621
Paper id 42201621Paper id 42201621
Paper id 42201621
 
Fuzzy Optimized Metric for Adaptive Network Routing
Fuzzy Optimized Metric for Adaptive Network RoutingFuzzy Optimized Metric for Adaptive Network Routing
Fuzzy Optimized Metric for Adaptive Network Routing
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
 
Minimum distance based routing protocol for lifetime improvement in wireless ...
Minimum distance based routing protocol for lifetime improvement in wireless ...Minimum distance based routing protocol for lifetime improvement in wireless ...
Minimum distance based routing protocol for lifetime improvement in wireless ...
 
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
 

Similar to Improving the selection of MPRs in OLSR protocol: a survey of methods and techniques

The Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksThe Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless Networks
Dr. Amarjeet Singh
 
An Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA AlgorithmsAn Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA AlgorithmsVignesh DJ Viki
 
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET Journal
 
MPR selection to the OLSR quality of service in MANET using minmax algorithm
MPR selection to the OLSR quality of service in MANET using minmax algorithmMPR selection to the OLSR quality of service in MANET using minmax algorithm
MPR selection to the OLSR quality of service in MANET using minmax algorithm
IJECEIAES
 
O dsr optimized dsr routing
O dsr optimized dsr routingO dsr optimized dsr routing
O dsr optimized dsr routing
ijwmn
 
Energy Efficient Multipath Routing For Mobile Ad Hoc Networks
Energy Efficient Multipath Routing For Mobile Ad Hoc NetworksEnergy Efficient Multipath Routing For Mobile Ad Hoc Networks
Energy Efficient Multipath Routing For Mobile Ad Hoc Networks
Zac Darcy
 
Energy Efficient Multipath Routing For Mobile Ad Hoc Networks
Energy Efficient Multipath Routing For Mobile Ad Hoc NetworksEnergy Efficient Multipath Routing For Mobile Ad Hoc Networks
Energy Efficient Multipath Routing For Mobile Ad Hoc Networks
Zac Darcy
 
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...
IJCNCJournal
 
Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient NodePerformance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
pijans
 
M-EPAR to Improve the Quality of the MANETs
M-EPAR to Improve the Quality of the MANETsM-EPAR to Improve the Quality of the MANETs
M-EPAR to Improve the Quality of the MANETs
IJERA Editor
 
Aa35152156
Aa35152156Aa35152156
Aa35152156
IJERA Editor
 
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IJNSA Journal
 
Iterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionIterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmission
ijasuc
 
D04622933
D04622933D04622933
D04622933
IOSR-JEN
 
Analyzing performance of zrp by varying node density and transmission range
Analyzing performance of zrp by varying node density and transmission rangeAnalyzing performance of zrp by varying node density and transmission range
Analyzing performance of zrp by varying node density and transmission range
Alexander Decker
 
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
IRJET Journal
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
csandit
 
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
IJNSA Journal
 
A new method for controlling and maintaining
A new method for controlling and maintainingA new method for controlling and maintaining
A new method for controlling and maintaining
IJCNCJournal
 

Similar to Improving the selection of MPRs in OLSR protocol: a survey of methods and techniques (20)

The Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksThe Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless Networks
 
An Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA AlgorithmsAn Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
 
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
 
218
218218
218
 
MPR selection to the OLSR quality of service in MANET using minmax algorithm
MPR selection to the OLSR quality of service in MANET using minmax algorithmMPR selection to the OLSR quality of service in MANET using minmax algorithm
MPR selection to the OLSR quality of service in MANET using minmax algorithm
 
O dsr optimized dsr routing
O dsr optimized dsr routingO dsr optimized dsr routing
O dsr optimized dsr routing
 
Energy Efficient Multipath Routing For Mobile Ad Hoc Networks
Energy Efficient Multipath Routing For Mobile Ad Hoc NetworksEnergy Efficient Multipath Routing For Mobile Ad Hoc Networks
Energy Efficient Multipath Routing For Mobile Ad Hoc Networks
 
Energy Efficient Multipath Routing For Mobile Ad Hoc Networks
Energy Efficient Multipath Routing For Mobile Ad Hoc NetworksEnergy Efficient Multipath Routing For Mobile Ad Hoc Networks
Energy Efficient Multipath Routing For Mobile Ad Hoc Networks
 
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...
 
Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient NodePerformance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
 
M-EPAR to Improve the Quality of the MANETs
M-EPAR to Improve the Quality of the MANETsM-EPAR to Improve the Quality of the MANETs
M-EPAR to Improve the Quality of the MANETs
 
Aa35152156
Aa35152156Aa35152156
Aa35152156
 
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
 
Iterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionIterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmission
 
D04622933
D04622933D04622933
D04622933
 
Analyzing performance of zrp by varying node density and transmission range
Analyzing performance of zrp by varying node density and transmission rangeAnalyzing performance of zrp by varying node density and transmission range
Analyzing performance of zrp by varying node density and transmission range
 
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
 
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
 
A new method for controlling and maintaining
A new method for controlling and maintainingA new method for controlling and maintaining
A new method for controlling and maintaining
 

More from IJECEIAES

Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...
IJECEIAES
 
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
IJECEIAES
 
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
IJECEIAES
 
Smart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a surveySmart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a survey
IJECEIAES
 
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...
IJECEIAES
 
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
IJECEIAES
 
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
IJECEIAES
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
IJECEIAES
 
Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
IJECEIAES
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
IJECEIAES
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
IJECEIAES
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
IJECEIAES
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
IJECEIAES
 
A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...
IJECEIAES
 
A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...
IJECEIAES
 
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersFuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
IJECEIAES
 
The performance of artificial intelligence in prostate magnetic resonance im...
The performance of artificial intelligence in prostate  magnetic resonance im...The performance of artificial intelligence in prostate  magnetic resonance im...
The performance of artificial intelligence in prostate magnetic resonance im...
IJECEIAES
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
IJECEIAES
 
Analysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behaviorAnalysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behavior
IJECEIAES
 
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
IJECEIAES
 

More from IJECEIAES (20)

Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...
 
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
 
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
 
Smart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a surveySmart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a survey
 
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...
 
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
 
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
 
Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...
 
A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...
 
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersFuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
 
The performance of artificial intelligence in prostate magnetic resonance im...
The performance of artificial intelligence in prostate  magnetic resonance im...The performance of artificial intelligence in prostate  magnetic resonance im...
The performance of artificial intelligence in prostate magnetic resonance im...
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Analysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behaviorAnalysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behavior
 
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
 

Recently uploaded

Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 

Recently uploaded (20)

Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 

Improving the selection of MPRs in OLSR protocol: a survey of methods and techniques

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 10, No. 1, February 2020, pp. 288~295 ISSN: 2088-8708, DOI: 10.11591/ijece.v10i1.pp288-295  288 Journal homepage: http://ijece.iaescore.com/index.php/IJECE Improving the selection of MPRs in OLSR protocol: a survey of methods and techniques Omar Barki1 , Zouhair Guennoun2 , Adnane Addaim3 1,2 Smart Communications, E3S Research Center, EMI, Mohammed V University, Morocco 3 ISET Laboratory, ENSA, Ibn Tofail University, Morocco Article Info ABSTRACT Article history: Received Jan 30, 2019 Revised Jul 26, 2019 Accepted Aug 29, 2019 Multi Point Relays (MPRs) are those nodes that are calculated and determined by the Optimized Link State Routing protocol (OLSR) in order to minimize and avoid overload inside the Mobile Ad hoc Network (MANET). In this paper, we will present a synthetic study of many techniques and methods for calculating and selecting the MPR nodes using a set of criteria namely energy, mobility, bandwidth, the quality of links, etc. The result of this study shows that most techniques consider a limited number of metrics for selecting the MPR nodes and therefore they are insufficient to allow the OLSR protocol to be quite complete and efficient because several metrics can occur at the same time in the real execution environment. Keywords: MANET MPR OLSR Wireless network Copyright © 2020 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Omar Barki, Smart Communications (ERSC), Ecole Mohammadia d’ingenieur, Mohammed V University, Rabat. Avenue Ibn Sina BP765 Agdal, Rabat, Morocco. Email: obarkiomar@gmail.com 1. INTRODUCTION The OLSR (Optimized Link State Routing) is a proactive routing protocol dedicated to MANET networks (Mobile Ad hoc Network) for establishing paths between network nodes. The routing process of this protocol is mainly based on the MPR (Multi Point Relay) selection technique in order to reduce the traffic load of the network and also to minimize the path to the destination [1, 2]. the MPRs search procedure launched by the NPC (Node Performing the Computation) makes it possible to detect a set of nodes able to transmit its messages and its data to other nodes far from its range and therefore cover the entire network. The computation of the MPR by the standard algorithm RFC3626 [3] presented below remains basic and insufficient because it does not take into account all the characteristics of the node and the network, for a thorough study of this problem we compared several approaches proposed by researchers in order to improve the quality of service [4, 5] and security level [6, 7] of this protocol against attacks [8, 9]. In the next section, we will present a brief description of a set of OLSR improved versions and approaches especially the MPRs selection technique, then in the third section, we will draw up a summary table of the comparative study and finally, we will conclude our study by analyzing the obtained results. 2. IMPROVED VERSIONS OF THE OLSR PROTOCOL (MPR) In this section, we will present a brief description of some techniques used for improving MPR selection algorithm in order to reduce the number of transmitted messages, optimize data transfer time between source and destination nodes and also to reduce the energy consumption for increasing the lifetime of the network.
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708  Improving the selection of MPRs in OLSR protocol: a survey of methods and techniques (Omar Barki) 289 2.1. OLSR According to RFC3626 [3], the technique used to calculate these MPRs is based on the symmetrical connections between the NPC node and its first and second neighbor nodes, is given by the following algorithm: N : The subset of the node’s neighbors, which are neighbors of the interface I. N2 : The set of 2-hop neighbors reachable from the interface I, excluding: a. the nodes only reachable by members of N with willingness WILL_NEVER b. the node performing the computation c. all the symmetric neighbors: the nodes for which a symmetric link to this node exists on some interface. D(y) : The degree of a 1-hop neighbor node y (where y is a member of N), is defined as the number of symmetric neighbors of node y, EXCLUDING all members of N and EXCLUDING the node performing the computation. The proposed heuristic is as follows: 1. Start with an MPR set made of all members of N with N_willingness equal to WILL_ALWAYS 2. Calculate D(y), where y is a member of N for all nodes in N. 3. Add to the MPR set those nodes in N, which are the only nodes to provide reachability to a node in N2. For example, if node b in N2 can be reached only through a symmetric link to node a in N, then add node a to the MPR set. Remove the nodes from N2 which are now covered by a node in the MPR set. 4. If there are nodes in N2 which are not covered by at least one node in the MPR set : a. For each node in N, we calculate the reachability, i.e., the number of nodes in N2 which are not yet covered by at least one node in the MPR set, and which are reachable through this 1-hop neighbor; b. We select as a MPR the node with highest N_willingness among the nodes in N with non-zero reachability. In case of multiple choices, we select the node which provides reachability to the maximum number of nodes in N2. In case of multiple nodes providing the same amount of reachability, we select the MPR node as the one where D(y) is greater. Remove the nodes from N2 which are now covered by a node in the MPR set. 2.2. L-OLSR In this version [10], the MPR selection algorithm takes into account the angle between two lines : the line composed of NPC node and node with the highest accessibility level noted: NA and the line composed of NPC node and candidate node for MPR noted: NC. If the angle is close to 90, 180 or 270, this node is considered MPR for the NPC node. The calculation of the NC-NPC-NA angle is made from the distances NPC-NA, NPC-NC and NA-NC (determined from the coordinates of each node) by the following formula: x = arcos ([(NPC -NA) 2 + (NPC-NC) 2 - (NA-NC) 2] / 2 * NA-NC) The result of the simulation on NS3 shows that the number of packets sent by standard OLSR is large compared to the number sent by L-OLSR but the number of packets received is almost the same for both OLSR versions, hence the number of lost packets for L-OLSR is minimal compared to OLSR. finally, the proposed L-OLSR approach (based on locating nodes for the selection of MPRs) is more efficient in terms of PDR, and therefore it improves the ability to transmit messages and data. 2.3. BW-OLSR This is a modified version of the RFC3626 MPR Selection Algorithm (SA MPR) in which the authors added the bandwidth as a parameter to consider for path computation between the source and destination node [11]. The path to take among the possible paths computed by OLSR via the MPRs of the NPC node is the one which contains the maximum of the nodes which have a wider bandwidth without this path necessarily being the shortest. The simulation carried out on OPNET for both versions OLSR and BW-OLSR showed that the latter presented a number of MPRs greater than that calculated by OLSR and consequently a significant increase in rate in the network. 2.4. DF-OLSR According to [12], the authors have tried to improve MPRs selection in terms of energy consumption and at the same time to secure it against nodes that are suspicious by isolating them from the rest of the network. The proposed algorithm is based on the exchange of three new messages namely: VOTEFOR and VOTERPL which mark every time the sequence of nodes N1 (1st neighborhood) by nodes N2 (2nd neighborhood) accessible by the nodes of N1. The nodes of N1 having the highest number of votes
  • 3.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 288 - 295 290 (VOTERPL maximum) is considered as MPR. The third message “INFO” is sent to N2 nodes to inform them of their MPR. This approach allowed reducing the energy consumption and quickly detecting the nodes using DOS to attack the network. 2.5. IOLSR The idea is to detect malicious nodes by using the number of HELLO messages sent, then block them for some time [13]. The solution consists in determining a threshold of number of Hello messages sent per unit of time knowing that the periodicity of this message is fixed at 2 seconds. Indeed, if the calculated number is higher than the normal value then the node is considered suspicious and it is blocked for a certain time. This approach helps reduce congestion in the network and prevent malicious nodes. 2.6. PB-OLSR The objective of the PB-OLSR (Performance Based OLSR) is to improve exchanges and services in the MANET network via MPRs that are more efficient and less energy-consuming by relying on a measurement model of the performance and confidence level of each node [14]. Indeed, firstly for the computation of the node performance, the author used the Multi Creteria Decision Analysis (MCDA) method and ROC (Rank Order Centroid) precisely on a set of criteria of this node (residual energy, RAM, CPU , ....) in order to determine the weight of each of these metrics. Secondly, to evaluate the trust of the node, he used an algorithm that relies on HELLO, TC messages and data messages routed through this node using the ROC technique to calculate the weight of each message. When receiving control messages or data messages, the algorithm increments the confidence value associated to the node. If a malicious behavior is detected, the algorithm will decrement the confidence value. The result of the simulation on NS3 has been shown that this approach allows: a. Reducing the impact of malicious nodes by calculating trust. b. Reducing the broadcast traffic in the network c. Maximizing the routing lifetime by avoiding nodes with poor performance being elected as MPRs. 2.7. EM-OLSR The selection of MPRs by the OLSR protocol is reinforced in this approach by calculating the value of the Willingness parameter from two metrics, namely the energy and mobility of the node [15]. Each node calculates its residual energy and its moving speed (supposing that each node is equipped with GPS to determine its coordinates) and it deduces from it the value of Willingness which can be willigness_default, willigness_low or willigness_high according to the result of the following algorithm: if ( lifetime > energy_threshold && mobility_speed > mobility_threshol or energy < energy_threshold && mobility_speed < mobility_threshold ) willingness = willigness_default if ( energy < energy_threshold && mobility_speed > mobility_threshold) willingness = willigness_low if ( energy > energy_threshold && mobility_speed < mobility_threshold) willingness = willigness_high; end. The result of the simulation performed on NS2 simulator shows that the EM-OLSR version gives better results compared to the OLSR standard protocol in terms of throughput, lost packets and energy consumption. 2.8. W-OLSR W-OLSR [16] is an OLSR standard extension in which the author has added for the selection of MPRs another parameter called Weihgted-MPR calculated from Residual Energy, Signal Strength and Transmission delay by the following formula: Weighted MPR= X * Residual Energy + Y * Signal Strength – Z * Transmission delay Where X, Y and Z are constants, if Weighted MPR <= weight_threshold then the node is considered MPR. At the source node the HELLO message is sent with the value of the residual energy and transmission time, and in reception the quality of this link (bad or good) is determined by measuring the residual energy, delay of transmission (sending time and current times) and the signal strength. The comparison of OLSR standard
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708  Improving the selection of MPRs in OLSR protocol: a survey of methods and techniques (Omar Barki) 291 with W-OLSR showed that the latter is more efficient compared to OLSR in terms of throughput and number of lost packets (PDR). 2.9. EOLSR, EOLSR-EC, EOLSR-RE According to [17], to guarantee a long MANET network lifetime, the OLSR version is reinforced by the addition of energy metric that produce the EOLSR (OLSR for energy consumption) version, which has made it possible to minimize the energy consumption and optimize the data transfer path calculation by modifying the HELLO and TC message formats by adding two types of parameters namely residual energy (RE) and consumed energy(EC), thus two versions for EOLSR have been established namely EOLSR-RE and EOLSR-EC. This approach consists in setting the thresholds of RE and EC and checking the following test: If the residual energy of the node is lower than the threshold value, the node is set to LOW-MPR-WILL, otherwise it is HIGH-MPR-WILL. And if the energy consumed by the node is less than the threshold value, the node takes the value HIGH-MPR-WILL otherwise it takes the value LOW-MPR-WILL. From the simulation result of this approach, the author noticed that the OLSR-RE is the best protocol in terms of energy efficiency compared to EOLSR-EC and OLSR. 2.10. M-OLSR OLSR is modified so that each node in the network can choose its strategy of "Update" or "Not update" the HELLO and TC messages in order to minimize the cost of path to borrow in terms of number of jump and energy [18]. This technique depends on the energy capacity of the intermediate nodes, if it reaches the threshold (given by the user), then it chooses another path. The evaluation of the performance of this approach is performed using various parameters namely “end to end delay”, “overhead routing” and “residual energy”. The results obtained from this simulation show that the proposed MOLSR algorithm offers a significant reduction of load of messages in the network and the energy consumption and also it presents a small reduction in the average throughput. 2.11. OLSR-ETX-ML-MD The author tried to compare the three versions of OLSR, namely ETX, ML and MD [19], knowing that: OLSR-ETX is based on the link quality in terms of sending and receiving HELLO messages, by the probability calculation (number of messages sent by X to Y / number of messages received by Y from X) for each node and the formula ETX is given by: ETX = 1 / P (X) * P (Y). So, for choosing the shortest path, we consider the path which has the sum of the smallest ETX. OLSR-ML is the basis for calculating ETX. This is the product called PLINK = P (X) * P (Y), finds the link where the number of lost packets is smaller. OLSR-MD is based on the measurement of transmission delay between the nodes calculated from the routing table. The shortest path is the path for which the delay is smaller. The comparison of this version has shown that OLSR-ETX gives more satisfaction in terms of evaluation parameters (end-to-end delay, Throughput ...). 2.12. MOB-2--OLSR The proposed Mob-2-OLSR protocol is an improvement on the two previous versions: OLSR and Mob-OLSR in order to limit the effects produced by the mobility of neighboring nodes and reduce the rate of packet loss and the value "End-to-end delay" [20]. For this purpose, the authors introduce metrics that calculate the mobility of neighboring nodes in the process used for the selection of MPR by giving priority to less mobile candidates. The proposed protocol Mob-2-OLSR provided, in most cases, the best results in terms of PDR, delay and throughput compared to other versions. 2.13. EDCR-OLSR According to [21], the authors took advantage of the idea used in the latest generation of microprocessors. Instead of using a single processor with high execution speed and thus highpower consumption, it would be preferable to use the processor with several cores in the same chip with an overall speed equivalent to the first processor and whose Energy consumption is reduced. Thus, by applying this idea to the OLSR protocol, the retransmission traffic control task is distributed over several MPRs. As results of this technique, the authors remarked a gain in terms of energy consumption and packet loss ratio. 2.14. OLSR-AAD The technique proposed in [22] consists in allowing each node the possibility to keep the maximum possible MPR. The authors have changed the order of selection of MPRs so that they introduce a new metric "Average Age of Death" based on the lifetime of the node already selected as MPR which depends on several
  • 5.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 288 - 295 292 criteria ie (Node mobility, network density, etc.). This approach was satisfactory in terms of PDR, delay and throughput. 2.15. EEPR-OLSR In the article [23], the author tries to improve the MANET network lifetime by maintaining routing path availability and minimizing power consumption in the OLSR protocol. The upgrade version is called EEPR_OLSR, it has presented significant results compared to standard OLSR. The author used GPS to retrieve information on the nodes in order to calculate the most stable path by Link Expiration Time (LET) giving by this formula: ( ) ( ) √( ) ( ) where , . For this EEPR_OLSR version, the simulation on NS3 has given a high PDR and life time results compared to OLSR Standard. 2.16. EEM-OLSR The main idea given by the authors of the article [24] is to use the technique of energy efficiency by choosing the shortest available path. Otherwise, we take the other shortest available alternative path in the case where the first path goes down. For this reason, the authors have modified the structure of the routing table by adding information that records the different paths from the same source to the same destination from the topology table. The comparison of this new version of OLSR with the OLSR standard, according to the parameters namely Throughput, Packet Delivery Ratio, Energy Efficiency, Normalized Routing load and End-to-End Delay, has shown that this approach has presented a significant optimization in terms of time and energy. 2.17. DCFM-OLSR The author has attempted to use the Denial Contradictions with Fictitious Node Mechanism (DCFM) technique to address possible attacks on OLSR protocol performance [25]. This technique is based on the same strategy followed by the attack itself in order to avoid it. It creates virtual nodes and uses data from the victim node to protect the network. The result of the proposed approach shows that it avoids a large number of attacks and therefore a more reliable data exchange could be set up between nodes. 2.18. OPE-OLSR In the paper [26], the authors proposed a new routing approach in the OLSR protocol based on the energy consumption for selecting the MPR nodes in order to increase the lifetime of the MANET network. The main idea is to try to privilege the nodes in N1 having higher energy to be an MPR because the MPR node consumes more energy than other non-MPR nodes. If several nodes have the same value of energy, we choose the MPR node which covers more nodes in N2. The proposed algorithm is as follow: a. Let assume X is a node which wants to compute MPR set. N1 is a set of X’s 1-hop neighborhood and N2 is a set of X’s 2-hop neighborhood. b. If (Set N1 is empty) {Wait until topology changes Goto step 1} Else { If (Are there two or more nodes offering the same maximum energy) {Select node i in N1 which covers maximum nodes (highest degree) in N2 } Else {Select node i which has highest Energy} } c. Node in N2 has symmetric link with node i of N1
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708  Improving the selection of MPRs in OLSR protocol: a survey of methods and techniques (Omar Barki) 293 d. Choose node i in N1 as MPR e. Delete the nodes of N2 which are symmetrically connected with node i in N1 f. If (Set N2 is empty) {S: MPR Set of X} Else {Consider node i in N1 which has Max Energy and not yet considered as MPR Remaining nodes in N2 has symmetric link with node i of N1 Goto step 4.} 3. STUDY AND RESULTS The different optimization approaches of calculation of the MPR are cited in Table 1. The study of those approaches allowed us to note the following remarks: a. Most approaches have focused on energy in comparison to other parameters (Mobility, security, bandwidth). b. Most approaches deal with one, two or three parameters at a time without taking into account the impact of the others. c. The consideration of the characteristics of the material is almost null in the studies carried out by the authors. d. We also note the absence of mathematical models in several studies approaches e. The changes made by the authors are often done on the algorithm of selection of the MPRs and the formats of messages HELLO and TC. f. The study of the dependence between the parameters is not taken into account, knowing that the change of one parameter can affect the others. g. The most common type of mobility used in the simulation is Random Way Point compared to Random Direction, Manhattan Grid, Freeway Point and others. h. The simulations were performed with NS2 tool compared to NS3. i. Lack of the reaction study of this protocol by acting on several parameters at a same time. Table 1. Comparison between MPR selection approaches based on the authors focuses axes Energy Bandwith Mobility Node Geometric informatio n Simulator Path(Link) Security Hello Tc Hard/Soft Mobility type Math. Model Control overhead Lifetime Of OLSR X X X S RWP L-OLSR X NS3 X S RD2dM M BW-OLSR X OPNET X S X DF-OLSR X X S IOLSR X X X S RWP PB-OLSR NS2 X X X X H, S RWP MCDA EM-OLSR X X GPS NS2 X X RWP, MG, FP EOLSR-EC X X X X S RWP W-OLSR X X X X S RWP X MOLSR X NS3 X X X S X OLSR-ML X NS2 X X S X OLSR-MD X NS2 X X S X OLSR-ETX X NS2 X X S X MOB-2- OLSR X NS2 X S RWP EDCR- OLSR X NS2 X S RWP OLSR- AAD NS2 X S RWP MPR EEPR- OLSR X GPS NS3 X S R.Walk- based X Network EEM-OLSR X NS2 X X X S R.D X DCFM- OLSR X X X S X OPE-OLSR X NS2 X S Network
  • 7.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 288 - 295 294 4. CONCLUSION In this article, we have attempted to present a survey study of a set of approaches and techniques concerning the changes made to the OLSR protocol for improving the MPR selection technique and for maintaining the life time of the network as long as possible by allowing the network nodes more reliable exchanged data. This survey made it possible to know the impact of metrics to select the MPR nodes and calculate an optimal path from source node to destination node. Also, this survey allows knowing the orientations of the researchers and their concerns. Finally, in this article, we have given a set of remarks on the OLSR protocol execution environment that can open new research subject and new innovative ideas in this field. REFERENCES [1] O. Barki, et al., “Formal verification of MPR selection algorithm in the OLSR protocol,” 10th International Conference, Intelligent Systems: Theories and Applications (SITA), pp. 1-5, 2015. [2] O. Barki, et al., “Comparative study of MPR selection algorithms based on Statistical Model Checking,” 5th International Conference on Multimedia Computing and Systems (ICMCS'16), IEEE Conference, 2016. [3] T. Clausen and P. Jacquet, “Optimized Link State Routing Protocol (OLSR),” Project Hipercom, INRIA, RFC3626, 2003. [4] Alamsyah, et al., “MPR selection to the OLSR quality of service in MANET using minmax algorithm,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 1, pp. 417-425, 2019. [5] S. Sahu and S. Sharma, “Secure and proficient cross layer (SPCL) QoS framework for mobile ad-hoc network,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 4, pp. 2603-2613, 2019. [6] A. Ahmad and S. Ismail, “User Selective Encryption Method for Securing MANETs,” International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 5, pp. 3103-3111, 2018. [7] K. R. Rao, et al., “An Effective Data Privacy Mechanism through Secure Session Key Exchange Model for MANET,” International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 5, pp. 3267-3277, 2018. [8] Y. Khamayseh, et al., “Intelligent black hole detection in mobile AdHoc networks,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 3, pp. 1968-1977, 2019. [9] N. Panda and B. K. Pattanayak, “Analysis of Blackhole Attack in AODV and DSR,” International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 5, pp. 3092-3102, 2018. [10] W. Anbao and Z. Bin, “Improving MPR Selection Algorithm in OLSR Protocol Based on Node Localization Technology,” Journal of networks, vol. 9, 2014. [11] D. Moad, et al., “Improving the Quality of Service Routing in OLSR Protocol,” International Conference Communications and Information Technology (ICCIT), 2012. [12] G. Ezhilarasi, et al., “Improving MPR selection algorithm in olsr Protocol based on dos free transmission in MANET MPR selection process,” International Journal of Technology and Engineering System (IJTES), vol 7, pp. 239-243, 2015. [13] J. Bavaliya, et al., “An Improved OLSR Protocol IOLSR to Detect and Prevent Flood Attack over MANET,” IJESC, vol. 6, 2016. [14] M. Dyabi, et al., “PB-OLSR: Performance Based OLSR,” IJCSNS International Journal of Computer Science and Network Security, vol. 15, 2015. [15] L. Fatima and E. Najib, “Energy and mobility in OLSR routing protocol,” Cyber Journals: Multidisciplinary Journals in Science and Technology, (JSAT), 2012. [16] L. S. Anandrao and J. Y. Amey, “Comparison of OLSR and Energy Conserved OLSR,” International Journal of Technical Research and Applications, vol. 2, pp. 05-08, 2014. [17] Mohit and S. Pal, “Stable MPR Selection in OLSR for Mobile Ad-Hoc Networks,” (IJCSIT) International Journal of Computer Science and Information Technologies, vol. 6, pp. 5121-5125, 2015. [18] A. K. Jaiswal and S. Tiwari, “Modified OLSR (MOLSR) Protocol for improving optimal route selection with Dynamic MPR selection in Mobile Adhoc Network,” IJSRSET, vol. 1, 2015. [19] A. Pandey and M. Baliyan, “Performance Analysis of OLSR and Modified Version of OLSR-ETX/MD/ML in Mesh Networks,” International Journal of Computer Science & Communication Networks, vol. 2, pp. 268-271. [20] A. Ouacha, et al., “OLSR protocol enhancement through mobility integration,” 10th IEEE International Conference in Networking, Sensing and Control (ICNSC), pp. 17-22, 2013. [21] A. Ouacha, et al., “Proactive routing based distributed energy consumption,” Intelligent Systems: Theories and Applications (SITA), 2013 8th International Conference on, pp. 1-5, 2013. [22] A. Ouacha, et al., “New Mobility Metric based on MultiPoint Relay Life Duration,” presented at the Proceedings of the International Conference on Signal Processing and Multimedia Applications and Wireless Information Networks and Systems, Rome, Italy, 2012. [23] A. Sahnoun, et al., “EEPR-OLSR: An Energy Efficient and Path Reliability Protocol for Proactive Mobile Ad-hoc Network Routing,” International Journal of Communication Networks and Information Security (IJCNIS), vol. 9, 2017. [24] S. M. Chauhan and A. M. Lathigara, “Energy Efficient Multipath OLSR in Mobile Adhoc Networks,” International Research Journal of Engineering and Technology (IRJET), vol. 03, 2016.
  • 8. Int J Elec & Comp Eng ISSN: 2088-8708  Improving the selection of MPRs in OLSR protocol: a survey of methods and techniques (Omar Barki) 295 [25] V. I. U. Rani and K. T. Reddy, “To Improve the Security of OLSR Routing Protocol Based on Local Detection of Link Spoofing,” International Journal of Science Engineering Technology, IJSEAT, vol. 5, 2017. [26] S. Prajapati, et al., “Optimizing Performance of OLSR Protocol Using Energy Based MPR Selection in MANET,” 2015 Fifth International Conference on Communication Systems and Network Technologies, 2015. BIOGRAPHIES OF AUTHORS Omar Barki, PhD student in Research Team in Smart Communications - ERSC, E3S Research Center, EMI, Mohammed V University in Rabat, Morocco. He was born in ERRACHIDIA, Morocco in 1975.He received his MST degree in Software Engineering in Sciences and technologies Faculty in 1998,and his Advanced graduate degree in informatics and Telecommunications from Faculty of Sciences of Rabat in 2008, His fields of interest are networks architecture and wireless sensor network. Zouhair Guennoun, Research Team in Smart Communications - ERSC, E3S Research Center, EMI, Mohammed V University in Rabat, Morocco. Zouhair Guennoun was born in Fès, Morocco in 1964. He received his engineering degree in Electronics and Telecommunications from the Electronics and Electrical Montefiore Institute, ULG Liege, Belgium in 1987; his M.Sc. degree in Communication Systems from the EMI School of Engineering, Rabat, Morocco in 1993; and his PhD degree from the same school in 1996. He visited the Centre for Communication Research (CCR) in Bristol University, UK, during the period of 1990-1994 to prepare a split PhD. His fields of interest are digital signal processing, error control coding, speech and image processing, telecommunication systems, networks architecture and networks security. Prof. Guennoun is an IEEE senior member (member since 1990); and ex-member of the Moroccan IEEE section executive committee. During 1988-1996 he worked as an Assistant Lecturer in the EMI School of engineering, and from 1996 he is working in the same school as a Professor Lecturer. Currently, he is in charge of the research team of Smart Communications – ERSC (formerly known as LEC) as part of the research center in engineering sustainable and smart systems at EMI, University Mohammed V in Rabat. Adnane Addaim. He received his master diploma in 2001 and his Ph.D. degree in 2008, both in satellite communication from Mohammadia School of Engineers (EMI), Morocco. From 2002 to 2003, he was employed at SIEMENS.AG, as Transmission Engineer, responsible of the implementation of the supervision network of the Meditelecom GSM Network, in Morocco. From 2004 to 2009, he was teaching assistant at EMI and research engineer at Centre for Space Research and Studies (CRES, EMI) working on research projects dealing with the design of university microsatellite. He is recipient of the first prize of the 2007-2009 best PhD thesis in the field of Sciences and technologies at Mohammed V university. From Mars to August 2010, he was with post-doctoral scholarship at the Satellite Communication and Networking Laboratory (SCNL) at the faculty of engineering, University of Genoa. From 2010 to 2014, he has been Assistant Professor at the ENSA Engineering school kenitra, Morocco. From 2015, he has been an associate professor at the same school. His current research interests include signal processing, communication networks and satellite communication systems.