This article includes a list of references, related reading, or external links, but its sources remain unclear because it lacks inline citations. Please help improve this article by introducing more precise citations.(July 2014) (Learn how and when to remove this message)
The OrderOne MANET Routing Protocol is an algorithm for computers communicating by digital radio in a mesh network to find each other, and send messages to each other along a reasonably efficient path. It was designed for, and promoted as working with wireless mesh networks.
OON's designers say it can handle thousands of nodes, where most other protocols handle less than a hundred. OON uses hierarchical algorithms to minimize the total amount of transmissions needed for routing. Routing overhead is limited to between 1% and 5% of node-to-node bandwidth in any network and does not grow as the network size grows.
The basic idea is that a network organizes itself into a tree. Nodes meet at the root of the tree to establish an initial route. The route then moves away from the root by cutting corners, as ant-trails do. When there are no more corners to cut, a nearly optimum route exists. This route is continuously maintained.
Each process can be performed with localized minimal communication, and very small router tables. OORP requires about 200K of memory. A simulated network with 500 nodes transmitting at 200 bytes/second organized itself in about 20 seconds.
As of 2004, OORP was patented or had other significant intellectual property restrictions. See the link below.
and 27 Related for: Order One Network Protocol information
The OrderOne MANET Routing Protocol is an algorithm for computers communicating by digital radio in a mesh network to find each other, and send messages...
The Network Time Protocol (NTP) is a networkingprotocol for clock synchronization between computer systems over packet-switched, variable-latency data...
In computer networks, a tunneling protocol is a communication protocol which allows for the movement of data from onenetwork to another. It can, for...
use different hardware or operating systems. To implement a networkingprotocol, the protocol software modules are interfaced with a framework implemented...
In computer networking, the User Datagram Protocol (UDP) is one of the core communication protocols of the Internet protocol suite used to send messages...
algorithms are: CBRP (Cluster Based Routing Protocol) FSR (Fisheye State Routing protocol) OrderOneNetworkProtocol; Fast logarithm-of-2 maximum times to...
The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP...
The Time Protocol is a networkprotocol in the Internet Protocol Suite defined in 1983 in RFC 868 by Jon Postel and K. Harrenstein. Its purpose is to...
Location Protocol (SLP, srvloc) is a service discovery protocol that allows computers and other devices to find services in a local area network without...
similar computer networks according to functional criteria. The foundational protocols in the suite are the Transmission Control Protocol (TCP), the User...
The Internet Protocol (IP) is the network layer communications protocol in the Internet protocol suite for relaying datagrams across network boundaries...
Virtual Network Computing (VNC) is a graphical desktop-sharing system that uses the Remote Frame Buffer protocol (RFB) to remotely control another computer...
Internet Protocol version 4 (IPv4) is the first version of the Internet Protocol (IP) as a standalone specification. It is one of the core protocols of standards-based...
the TCP/IP protocols in the development of the Internet, the term network socket is most commonly used in the context of the Internet protocol suite, and...
Network File System (NFS) is a distributed file system protocol originally developed by Sun Microsystems (Sun) in 1984, allowing a user on a client computer...
Transfer Protocol (TFTP) is a simple lockstep File Transfer Protocol which allows a client to get a file from or put a file onto a remote host. One of its...
The Internet Control Message Protocol (ICMP) is a supporting protocol in the Internet protocol suite. It is used by network devices, including routers,...
time, generally follow suit adopting these protocol extensions. eDonkey client programs connect to the network to share files. eDonkey servers act as communication...
The Spanning Tree Protocol (STP) is a networkprotocol that builds a loop-free logical topology for Ethernet networks. The basic function of STP is to...
polarized over the issue of which communication protocol would result in the best and most robust networks. This culminated in the Internet–OSI Standards...
In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery...
path-vector routing protocol, and it makes routing decisions based on paths, network policies, or rule-sets configured by a network administrator. BGP...
In computer networking, the Hot Standby Router Protocol (HSRP) is a Cisco proprietary redundancy protocol for establishing a fault-tolerant default gateway...
Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol suite. It originated in the initial network implementation in which...
RTP Control Protocol (RTCP) is a binary-encoded out-of-band signaling protocol that functions alongside the Real-time Transport Protocol (RTP). Its basic...
Alternating bit protocol (ABP) is a simple networkprotocol operating at the data link layer (OSI layer 2)[citation needed] that retransmits lost or corrupted...
The Subnetwork Access Protocol (SNAP) is a mechanism for multiplexing, on networks using IEEE 802.2 LLC, more protocols than can be distinguished by the...