a b s t r a c t Flows transported across mobile ad hoc wireless networks suffer from route breakups caused by nodal mobility. In a network that aims to support critical interactive real-time data transactions, to provide for the uninterrupted execution of a transaction, or for the rapid transport of
Robust position-based routing for wireless ad hoc networks
β Scribed by Kousha Moaveninejad; Wen-Zhan Song; Xiang-Yang Li
- Publisher
- Elsevier Science
- Year
- 2005
- Tongue
- English
- Weight
- 449 KB
- Volume
- 3
- Category
- Article
- ISSN
- 1570-8705
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location information to make forwarding decisions. However, there are several potential security issues for the development of posi
In this paper, we propose a cooperative approach for routing in wireless ad hoc networks. Our solution improves the interference distribution in the network, with an immediate positive impact on the throughput performance and energy efficiency. In determining new routes, we consider not only the cos
## Abstract This paper describes a novel qualityβofβservice (QoS) routing protocol for ad hoc networks based on the OLSR protocol. Our protocol, QOLSR, is designed for wireless networks with stationary or moving nodes, where each node is equipped with 802.11 wireless card. The goal of our protocol
One of the new paradigms in wireless communications that is going to prevail in the next few decades is ad hoc networking.Β *Ad Hoc Wireless Networks* seeks to explore this paradigm shift in wireless networking and presents topics ranging from the basic principles of networking and communication sys
## Abstract By exploiting nonβrandom behaviors for the mobility patterns that mobile users exhibit, we can predict the future state of network topology and perform route reconstruction proactively in a timely manner. Moreover, by using the predicted information on the network topology, we can elimi