[Olsr-dev] BUGs found in MPR selection algorithm and Default message Forwarding Algorithm

Henning Rogge (spam-protected)
Tue Mar 24 22:59:09 CET 2009

On Dienstag 24 März 2009 16:21:02 Andres Medina wrote:
>  More on the 2nd bug:
> While we are not convinced which flooding techniques is better, after
> considerable debate, we are fairly convinced that the RFC says that the TC
> message should not be forwarded if it has ever been received over a
> symmetric link.
I dont think so.

> We ran some simulations and found that the RFC method greatly reduces the
> number of nodes that forward a TC message (see attached plot). However, we
> are unsure whether the RFC method would significantly reduce the
> reliability of TC message flooding. Clearly, significantly unreliable TC
> message flooding would be bigger problem than too much overhead. We are
> studying this issue and should have a more definitive answer in the next
> month or so. Perhaps this second bug should not be addressed until our
> analysis is complete.
What configuration parameters did you use for your tests ?

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 198 bytes
Desc: This is a digitally signed message part.
URL: <http://lists.olsr.org/pipermail/olsr-dev/attachments/20090324/a89e00c7/attachment.sig>

More information about the Olsr-dev mailing list