skip to main content
10.1145/2222436.2222439acmotherconferencesArticle/Chapter ViewAbstractPublication PagesarmorConference Proceedingsconference-collections
research-article

An aspect-oriented approach to face neighbour saturation issues in proactive ad hoc routing protocols: olsrd as a case study

Published:08 May 2012Publication History

ABSTRACT

Ad hoc networking is gaining momentum in contexts of use requiring the rapid, and low cost, deployment of communication networks. However, many studies show that ad hoc routing protocols are threatened by a variety of accidental and malicious faults that limit their use in practice. This paper explores the feasibility of using Aspect-Oriented Programming (AOP) to develop reusable mechanisms to mitigate the negative effects of a high density of neighbour nodes on the dependability of olsrd, an implementation of the Optimised Link-State Routing protocol (OLSR), one of the most widely-used ad hoc routing protocol implementations existing today. On one hand, aspect orientation has the potential to promote a clear separation between existing functional (protocol-related) capabilities and the non-functional (fault tolerance-related) features of the system. On the other hand, this approach eases the adaptation of fault tolerance mechanisms to evolutions the protocol implementations may suffer along the time.

References

  1. The Federal Response to Hurricane Katrina: Lessons Learned. U. S. Executive Office of the President, 2006.Google ScholarGoogle Scholar
  2. Erich Bruns and Oliver Bimber. Phone-to-phone communication for adaptive image classification. In Int. Conf. on Advances in Mobile Computing and Multimedia, pages 276--281, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. C. Perkings. Ad hoc On-Demand Distance Vector(AODV) Routing. RFC 3561, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. Friginal, D. de Andres, J. Ruiz, and P. Gil. Using performance, energy consumption, and resilience experimental measures to evaluate routing protocols for ad hoc networks. In 10th IEEE International Symposium on Network Computing and Applications (NCA), pages 139 --146, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. G. Cabri et al. The LAICA Project: An Ad-hoc Middleware to Support Ambient Intelligence. Multiagent and Grid Systems Journal, Vol. 2(3):235--247, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Gustavo Marfia, Giovanni Pau, Enzo De Sena, Eugenio Giordano, and Mario Gerla. Evaluating vehicle network strategies for downtown portland: opportunistic infrastructure and the importance of realistic mobility models. In Proceedings of the 1st workshop on Mobile opportunistic networking, pages 47--51, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. G.C. Murphy, R. J. Walker, and E. L. A. Banlassad. Evaluating emerging software development technologies: lessons learned from assessing aspect-oriented programming. IEEE Transactions on Software Engineering, 25(4):438 --455, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. E.M. Royer, P. M. Melliar-Smith, and L. E. Moser. An analysis of the optimum node density for ad hoc mobile networks. In IEEE International Conference on Communications (ICC), volume 3, pages 857 --861, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  9. P. Serrano, C. J. Bernardos, A. de la Oliva, and I. Soto. Lessons learned from the deployment of a multihop ieee 802.11g testbed using cots devices. In European Wireless Conference (EW), pages 667 --674, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  10. T. Clausen and P. Jacquet. Optimized Link State Routing Protocol (OLSR). RFC 3626, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Saleh Yousefi, Mahmoud Siadat Mousavi, and Mahmood Fathy. Vehicular ad hoc networks (vanets): Challenges and perspectives. In 6th International Conference on ITS Telecommunications, pages 761 --766, 2006.Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ARMOR '12: Proceedings of the 1st European Workshop on AppRoaches to MObiquiTous Resilience
    May 2012
    42 pages
    ISBN:9781450311502
    DOI:10.1145/2222436

    Copyright © 2012 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 8 May 2012

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader