Geir Egeland

Learn More
—A prerequisite for a widespread and successful deployment of proactive ad-hoc networking technology is its ability to provide easy access to the Internet. Gateway node in the ad hoc network. In this paper we discuss different strategies for providing Internet access to proactive ad hoc networks. We also describe problems experienced in our lab test-bed(More)
Common user applications cannot run in mobile ad-hoc networks (MANETs) before a method for name resolution is in place. While the Domain Name System (DNS) works well on the fixed Internet, it represents a centralized approach to name resolution, which is not suitable for MANETs. This article refines the framework developed for name resolution in MANETs and(More)
—The network reliability and availability in wireless multi-hop networks can be inadequate due to radio induced interference. It is therefore common to introduce redundant nodes. This paper provides a method to forecast how the introduction of redundant nodes increases the reliability and availability of such networks. For simplicity, it is assumed that(More)
—The links in an ad hoc or wireless mesh network are normally kept alive by the exchange of Hello-messages between neighbouring nodes. These Hello-messages are prone to collisions with traffic from hidden nodes. If several Hello-messages are lost due to overlapping transmissions, the node expecting the Hello-messages erroneously assumes that the link is(More)
The communication performance in wireless networks is often heavily influenced by failures caused by node mobility and radio disturbance. Proactive link-state routing protocols like OLSR and OSPFv3 with wireless extensions (WOSPF) are currently relying on slow re-convergence to restore successful packet forwarding. This may not be appropriate for particular(More)
—A prerequisite for a widespread and successful deployment of on-demand ad-hoc networking technology is its ability to provide easy access to the Internet. Existing solutions for Internet access are mainly based on modifying Mobile IPv4 (MIPv4). An easier approach, yet poorly documented in published material, is to implement Network Address Translation(More)
The links in an ad hoc or wireless mesh network are normally kept alive by the exchange of beacon-messages between neighboring nodes. These beacons are prone to collisions with traffic from hidden nodes. If several beacons are lost due to overlapping transmissions, the node expecting the beacons erroneously assumes that the link is down. This is called an(More)
—The links in an ad hoc or wireless mesh network are normally kept alive by the exchange of beacons between neighboring nodes. These beacons are prone to collisions with traffic from hidden nodes. If several beacons are lost due to overlapping transmissions, the node expecting the beacons erroneously assumes that the link is down. This is called an apparent(More)