161 research outputs found

    Performance Evaluation of using a Dynamic Shortest Path Algorithm in OLSRv2

    Get PDF
    MANET routing protocols are designed to scale up to thousands of routers with frequent changes of the topology. In preference, MANET routing protocols should also support constrained low-power devices. One of the bottlenecks of scalability in link-state routing protocols is the performance of the shortest path algorithm (e.g. Dijkstra). In this document, we investigate the in-node performance of OLSRv2 and, in particular, study the benefits of using a dynamic shortest path (DSP) algorithm for this routing protocol. A DSP algorithm is an algorithm that adds or removes edges in the routing tree incrementally and calculates shortest paths, also incrementally. The performance in OLSRv2 with classic Dijkstra vs. DSP is evaluated, by comparing the CPU time for calculating paths in a large emulated network. Additionally, it is demonstrated that frequent topology changes due to mobility in MANETs lead to frequent routing table recalculations with only few routes updated each time. This property of MANETs makes the use of a DSP in OLSRv2 appropriate

    Integrating Java Support for Routing Protocols in NS2

    Get PDF
    This document presents a modification of the existing tool AgentJ which allows for running a Java routing protocol within the network simulator NS2

    Performance Analysis of SNMP in OLSRv2-routed MANETs

    Get PDF
    Mobile Ad Hoc NETworks (MANETs) are generally thought of as infrastructure-less and largely "un-managed", capable of accommodating highly dynamic network topologies. Yet, while the network may be un-managed, monitoring performance and setting configuration parameters post-deployment, remains important in order to ensure proper ''tuning'' and maintenance of a MANET. While SNMP is sometimes considered too ''heavy'' for MANETs -- a too chatty a protocol with too large protocol messages -- it remains the predominant management and monitoring protocol in the Internet, and many implementations exist. This \articleformat analyzes SNMP in an OLSRv2-routed MANET, with the purpose of investigating performance metrics, such as delivery ratio, delay, management overhead, collisions and performance monitoring accuracy. In order to address concerns both regarding SNMP being "heavy", as well as regarding the accuracy of performance reports obtained via SNMP polling in MANETs, where path delays can be highly variable, the utility of performance reporting proxies, i.e. the REPORT-MIB, is studied. The obtained results show that a significant benefit can be obtained by so deploying performance reporting proxies in an SNMP managed MANET. The investigations are supported by way of network simulations (NS2).Lorsquon parle de réseaux mobiles ad-hoc (MANETs), on pense généralement à des réseaux sans infrastructure et à des déploiements en réseaux largement non-gérés, pouvant s'adapter à des topologies de réseau très changeantes. Néanmoins, bien que l'infrastructure du réseau est de nature non-gérée, la surveillance des performances du réseau et le choix des paramètres de configuration une fois le réseau déployé demeurent primordiaux pour la maintenance et le réglage fin d'un réseau MANET. Alors que SNMP est parfois considéré trop "lourd" pour des MANETs, il demeure le protocole prédominant de management et monitorage d'Internet, et beaucoup implémentations du protocole existent. Ce rapport analyse SNMP dans des MANETs basés sur OLSRv2, avec l'intention de déterminer des métriques de performance, comme le taux de remise, délai, overhead et collisions dans le simulateur de réseaux NS2

    Security Issues in the Optimized Link State Routing Protocol version 2 (OLSRv2)

    Get PDF
    Mobile Ad hoc NETworks (MANETs) are leaving the confines of research laboratories, to find place in real-world deployments. Outside specialized domains (military, vehicular, etc.), city-wide community-networks are emerging, connecting regular Internet users with each other, and with the Internet, via MANETs. Growing to encompass more than a handful of ``trusted participants'', the question of preserving the MANET network connectivity, even when faced with careless or malicious participants, arises, and must be addressed. A first step towards protecting a MANET is to analyze the vulnerabilities of the routing protocol, managing the connectivity. By understanding how the algorithms of the routing protocol operate, and how these can be exploited by those with ill intent, countermeasures can be developed, readying MANETs for wider deployment and use. This memorandum takes an abstract look at the algorithms that constitute the Optimized Link State Routing Protocol version 2 (OLSRv2), and identifies for each protocol element the possible vulnerabilities and attacks -- in a certain way, provides a ``cookbook'' for how to best attack an operational OLSRv2 network, or for how to proceed with developing protective countermeasures against these attacks

    Comparative Study of RPL-Enabled Optimized Broadcast in Wireless Sensor Networks

    Get PDF
    Recent trends have suggested convergence to Wireless Sensor Net- works (WSNs) becoming IPv6-based. To this effect, the Internet Engineering Task Force has chartered a Working Group to develop a routing protocol specification, enabling IPv6-based multi-hop WSNs. The current effort of this working group is development of a unicast routing protocol denoted RPL. RPL constructs a “DAG-like” logical structure with a single root, at which the majority of the traffic flows terminate, and assumes restrictions on network dynamics and traffic generality, in order to satisfy strict constraints on router state and processing. This memorandum investigates the efficient network-wide broadcast mechanisms in WSNs, using the logical structure already established by RPL. The aim hereof is to impose minimal additional state requirements on WSN routers, beyond that already maintained by RPL. This memorandum presents a selection of such broadcast mechanisms for RPL routed WSNs, and evaluates their performances. As part of this evaluation, the memorandum compares with MPR Flooding – an established efficient flooding optimization, widely used in MANETs.Les tendances récentes suggèrent une convergence des réseaux de capteurs sans fils (WSNs ou Wireless Sensor Networks) vers IPv6. C'est pourquoi l'IETF (Internet Engineering Task Force) a mis en place un groupe de travail, chargé de spécifier un protocole de routage permettant aux réseaux de capteurs sans fil multi-sauts de fonctionner avec IPv6. Les efforts du groupe de travail se concentrent actuellement sur le développement d'un protocole de routage unicast appelé RPL. RPL construit une architecture logique de type DAG (graphe orienté acyclique) avec un noeud racine unique sur lequel se termine la majorité des flux de trafic, et suppose des restrictions sur les dynamiques du réseau et sur les types de trafic supportés afin de satisfaire les contraintes fortes des routeurs en terme d'états et de traitement. Cet article examine la possibilité de fournir aux réseaux de capteurs sans fil des mécanismes efficaces de broadcast (diffusion), en utilisant la structure logique déjà proposée par RPL. Le but est ici de ne pas imposer d'exigences supplémentaires aux routeurs WSN fonctionnant déjà avec RPL. De tels mécanismes de broadcast pour les réseaux WSN utilisant le routage RPL, l'article en présente plusieurs et évalue leur performance. Dans le cadre de cette évaluation, ils sont comparés aux mécanismes reconnus et efficaces d'optimisation de diffusion du protocole MPR Flooding, largement utilisé dans les réseaux MANETs

    Vulnerability Analysis of the Optimized Link State Routing Protocol version 2 (OLSRv2)

    Get PDF
    Mobile Ad hoc NETworks (MANETs) are leaving the confines of research laboratories, to find place in real-world deployments. Outside specialized domains (military, vehicular, etc.), city-wide community-networks are emerging, connecting regular Internet users with each other, and with the Internet, via MANETs. Growing to encompass more than a handful of ``trusted participants'', the question of preserving the MANET network connectivity, even when faced with careless or malicious participants, arises, and must be addressed. A first step towards protecting a MANET is to analyze the vulnerabilities of the routing protocol, managing the connectivity. By understanding how the algorithms of the routing protocol operate, and how these can be exploited by those with ill intent, countermeasures can be developed, readying MANETs for wider deployment and use. This paper takes an abstract look at the algorithms that constitute the Optimized Link State Routing Protocol version 2 (OLSRv2), and identifies for each protocol element the possible vulnerabilities and attacks -- in a certain way, provides a ``cookbook'' for how to best attack an operational OLSRv2 network, or for how to proceed with developing protective countermeasures against these attacks

    Study of Multipoint-to-Point and Broadcast Traffic Performance in RPL

    Get PDF
    Recent trends in Wireless Sensor Networks (WSNs) have suggested converging to such being IPv6-based. to this effect, the Internet Engineering Task Force has chartered a Working Group to develop a routing protocol specification, enabling IPv6-based multi-hop Wireless Sensor Networks. This routing protocol, denoted RPL, has been under development for approximately a year, and this memorandum takes a critical look at the state of advancement hereof: it provides a brief algorithmic description of the protocol, and discusses areas where -- in the authors view -- further efforts are required in order for the protocol to become a viable candidate for general use in WSNs. Among these areas is the lack of a proper broadcast mechanism. This memorandum suggests two such broadcast mechanisms, both aiming at (i) exploiting the existing routing state of RPL, while (ii) requiring no additional state maintenance, and studies the performance of RPL and of these suggested mechanisms.Les tendances récentes dans les réseaux de capteurs sans fil (Wireless Sensor Networks --WSNs) suggèrent une convergence vers des réseaux IPv6. A cet effet, l'IETF (Internet Engineering Task Force) a mis sur pied un groupe de travail pour élaborer la spécification d'un protocole de routage s'appliquant aux réseaux de capteurs sans fil multi-hop basés sur IPv6. Ce protocole de routage, appelé RPL, est en cours de développement depuis environ un an. Cet article présente un examen critique de son état d'avancement. Après une brève description algorithmique du protocole, une discussion est proposée sur des domaines, où selon les auteurs, des efforts supplémentaires sont nécessaires pour que le protocole puisse devenir candidat viable à une utilisation généralisée dans les réseaux de capteurs sans fil. Parmi ces domaines se trouve l'absence d'un mécanisme de diffusion approprié. Cet article suggère deux mécanismes de diffusion, tous deux avec l'objectif (i) de pouvoir exploiter l'état de routage actuel du protocole RPL (ii) sans requérir à une maintenance supplémentaire de cet état. Il étudie également les performances de RPL et des deux mécanismes de diffusion proposés

    A Comparative Performance Study of the Routing Protocols LOAD and RPL with Bi-Directional Traffic in Low-power and Lossy Networks (LLN)

    Get PDF
    Routing protocols for sensor networks are often designed with explicit assumptions, serving to simplify design and reduce the necessary energy, processing and communications requirements. Different protocols make different assumptions -- and this memorandum carefully considers those made by the designers of RPL -- an IPv6 routing protocol for such networks, developed within the IETF. Specific attention is given to the predominance of bi-directional traffic flows in a large class of sensor networks, and this memorandum therefore studies the performance of RPL for such flows. As a point of comparison, a different protocol, called LOAD, is also studied. LOAD is derived from AODV and supports more general kinds of traffic flows. The results of this investigation reveal that for scenarios where bi-directional traffic flows are predominant, LOAD provides similar data delivery ratios as RPL, while incurring less overhead and being simultaneously less constrained in the types of topologies supported

    Yet Another Autoconf Proposal (YAAP) for Mobile Ad hoc NETworks

    Get PDF
    This memorandum addresses the issues of automatic address and prefix configuration of MANET routers. Specifically, the paper analyzes the differences between "classic IP networks" and MANETs, emphasizing the interface, link, topology, and addressing assumptions present in "classic IP networks". The paper presents a model for how this can be matched to the specific constraints and conditions of a MANET - i.e., how MANETs can be configured to adhere to the Internet addressing architecture. This sets the stage for development of a MANET autoconfiguration protocol, enabling automatic configuration of MANET interfaces and prefix delegation. This autoconfiguration protocol is characterized by (i) adhering strictly to the Internet addressing architecture, (ii) being able to configure both MANET interface addresses and handle prefix delegation, and (iii) being able to configure both stand-alone MANETs, as well as MANETs connected to an infrastructure providing, e.g., globally scoped addresses/prefixes for use within the MANET. The protocol is specified through timed automatons which, by way of model checking, enable verification of certain protocol properties. Furthermore, a performance study of the basic protocol, as well as of various optimization and extensions hereto, is conducted based on network simulations.Cet article aborde les questions liées à la configuration automatique des adresses et préfixes dans les routeurs MANET. Plus spécifiquement, il analyse les différences entre les « réseaux IP classiques » et les réseaux MANET, en mettant l'accent sur l'interface, les liens et la topologie. Il étudie les hypothèses sous-jacentes dans les réseaux IP classiques et présente un modèle satisfaisant ces hypothèses dans le contexte spécifique des contraintes et conditions d'un réseau MANET, permettant par exemple de configurer les réseaux MANET de sortent qu'ils adhèrent à l'architecture d'adressage d'Internet. Les bases sont ainsi posées pour le développement d'un protocole d'auto configuration MANET, permettant la configuration automatique des interfaces MANET et la délégation automatique de préfixes. Ce protocole de configuration automatique se caractérise (i) par son adhérence stricte à l'architecture d'adressage d'Internet, (ii) par sa double capacité de configuration des interfaces MANET et de délégation de préfixes, et enfin (iii) par son aptitude à configurer aussi bien des réseaux MANETS indépendants que des réseaux MANET connectés à une infrastructure fournissant par exemple des adresses et préfixes à portée globale pour leur utilisation dans MANET. Le protocole est défini au travers d'automates temporels, qui grâce à un modèle de contrôle, permettent de vérifier certaines propriétés du protocole. En outre, une étude des performances du protocole de base, ainsi que de diverses optimisations et extensions, a été conduite à partir de simulations de réseau

    Multipoint-to-Point and Broadcast in RPL

    Get PDF
    Recent trends in Wireless Sensor Networks (WSNs) have suggested converging to such being IPv6-based. to this effect, the Internet Engineering Task Force has chartered a Working Group to develop a routing protocol specification, enabling IPv6-based multi-hop Wireless Sensor Networks. This routing protocol, denoted RPL, has been under development for approximately a year, and this memorandum takes a critical look at the state of advancement hereof: it provides a brief algorithmic description of the protocol, and discusses areas where -- in the authors view -- further efforts are required in order for the protocol to become a viable candidate for general use in WSNs. Among these areas is the lack of a proper broadcast mechanism. This memorandum suggests two such broadcast mechanisms, both aiming at (i) exploiting the existing routing state of RPL, while (ii) requiring no additional state maintenance, and studies the performance of RPL and of these suggested mechanisms
    • …
    corecore