<br><br><div class="gmail_quote">On Tue, Feb 28, 2012 at 7:59 PM, Wojciech Zabolotny <span dir="ltr"><<a href="mailto:wzab01@gmail.com">wzab01@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div class="im"><br></div>In the simplest version, the IP could be just the appropriate number<br>
of bytes from<br>
the fingerprint of the key. So the asymmetric key is generated first, then the<br>
fingerprint is calculted and IP is obtained from it. Of course in this<br>
case the IP<br>
is somehow randow, however in my experiments (up to ca. 20 node) the olsr<br>
protocol could handle fully random IP addresses (well, I don't know how it would<br>
scale up for a network consisting of e.g. 200 nodes covering a small town.)<br></blockquote><div><br></div><div>olsrd simply does not care if u use random ip adresses or not,..</div><div>they just have to be unique!</div>
<div><br></div><div>memory consumption/speed/protocol overhead is not affected by random or not adresses (as olsrd has no address or route "compressions", but might get in future)</div><div><br></div><div>and 200 nodes is no size to worry about,..</div>
<div>(even on the "smallest" router hardware)</div><div><br></div><div>Markus</div></div>