Link cache extensions for predictive routing and repair in ad hoc wireless networks

Research output: Chapter in Book/Report/Conference proceedingsChapterpeer-review

Abstract

In ad hoc networks that employ source-based on-demand routing protocols, network nodes can use information contained in packet headers to populate a link cache. Given sufficient route requests and network traffic, a link cache can provide a good view of the past spatial network topology. This view can be successfully applied to making future routing decisions, provided that links are allowed to expire through a timeout mechanism, so that the cache stays fresh. We further assume that each node has the ability to determine its location, velocity, and bearing. We propose a link timeout mechanism that is based on mobility prediction, and introduce link cache extensions that incorporate temporal information regarding the future state of the network topology. By utilizing spatial and temporal information, better and more efficient routing decisions can be made. Furthermore, local repairs can be initiated preemptively in anticipation of a link break.

Original languageEnglish
Title of host publication2002 4th International Workshop on Mobile and Wireless Communications Network, MWCN 2002
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages53-57
Number of pages5
ISBN (Electronic)0780376056, 9780780376052
DOIs
Publication statusPublished - 2002
Event4th International Workshop on Mobile and Wireless Communications Network, MWCN 2002 - Stockholm, Sweden
Duration: 9 Sep 200211 Sep 2002

Publication series

Name2002 4th International Workshop on Mobile and Wireless Communications Network, MWCN 2002

Conference

Conference4th International Workshop on Mobile and Wireless Communications Network, MWCN 2002
Country/TerritorySweden
CityStockholm
Period9/09/0211/09/02

Keywords

  • ad hoc
  • cache
  • mobile
  • prediction
  • routing
  • wireless

Fingerprint

Dive into the research topics of 'Link cache extensions for predictive routing and repair in ad hoc wireless networks'. Together they form a unique fingerprint.

Cite this