Dr Lee Speakman L.Speakman@salford.ac.uk
Lecturer in Cyber Security
Transient routing loops have been observed to form in Mobile Ad-hoc Networks running the OLSRv2 proactive link-state routing protocol. The packets falling into loops impact the surrounding network thus degrading throughput even though only a small proportion of the traffic may enter these loops and only for a short time. This becomes significantly more evident when Link Layer Notification is used to catch broken links, inadvertently leading to an increase in the number of loops. Two methods of Loop Detection are introduced and are used to trigger either Loop Suppression by selectively and preemptively discarding the looping packets that are unlikely to reach their destination, or Loop Correction by the notification of the routing protocol to cut the link over which the packet is looping. The newly introduced Loop Suppression and Loop Correction techniques used with Link Layer Notification are shown to significantly increase network performance over plain OLSRv2 and OLSRv2 with Link Layer Notification.
Speakman, L., Owada, Y., & Mase, K. (2009). Looping in OLSRv2 in Mobile Ad-Hoc Networks, Loop Suppession and Loop Correction. IEICE Transactions on Communications, E92-B(4), 1210-1221. https://doi.org/10.1587/transcom.e92.b.1210
Journal Article Type | Article |
---|---|
Publication Date | 2009 |
Deposit Date | Oct 22, 2024 |
Journal | IEICE Transactions on Communications |
Print ISSN | 0916-8516 |
Electronic ISSN | 1745-1345 |
Publisher | Institute of Electronics, Information and Communication Engineers |
Peer Reviewed | Peer Reviewed |
Volume | E92-B |
Issue | 4 |
Pages | 1210-1221 |
DOI | https://doi.org/10.1587/transcom.e92.b.1210 |
Keywords | mobile ad-hoc network, routing, loops |
Factors Amplifying or Inhibiting Cyber Threat Intelligence Sharing
(2024)
Presentation / Conference Contribution
An analysis of loop formation in OLSRv2 in ad-hoc networks and limiting its negative impact
(2008)
Presentation / Conference Contribution
Policing The Cyber Threat: Exploring the Threat from Cyber Crime and the Ability of Local Law Enforcement to Respond
(2018)
Presentation / Conference Contribution
About USIR
Administrator e-mail: library-research@salford.ac.uk
This application uses the following open-source libraries:
Apache License Version 2.0 (http://www.apache.org/licenses/)
Apache License Version 2.0 (http://www.apache.org/licenses/)
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search