On-line disjoint path routing for network capacity maximization in ad hoc networks

Weifa Liang*, Yuzhen Liu, Xiaoxing Guo

*Corresponding author for this work

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)

    Abstract

    In this paper we consider on-line disjoint path routing in energy-constrained ad hoc networks. The objective is to maximize the network capacity, i.e., maximize the number of messages routed successfully by the network without any knowledge of future disjoint path connection request arrivals and generation rates. We first present two on-line algorithms for the problem. One is based on maximizing the network lifetime and another is based on an exponential function of energy utilization at nodes. We then conduct extensive experiments by simulations to analyze the performance of the proposed algorithms. The experimental results show that the proposed algorithms outperform those existing algorithms that do not take into account the power load balancing among the nodes.

    Original languageEnglish
    Title of host publication2005 IEEE Wireless Communications and Networking Conference, WCNC 2005
    Subtitle of host publicationBroadband Wireless for the Masses - Ready for Take-off
    Pages2026-2031
    Number of pages6
    DOIs
    Publication statusPublished - 2005
    Event2005 IEEE Wireless Communications and Networking Conference, WCNC 2005: Broadband Wirelss for the Masses - Ready for Take-off - New Orleans, LA, United States
    Duration: 13 Mar 200517 Mar 2005

    Publication series

    NameIEEE Wireless Communications and Networking Conference, WCNC
    Volume4
    ISSN (Print)1525-3511

    Conference

    Conference2005 IEEE Wireless Communications and Networking Conference, WCNC 2005: Broadband Wirelss for the Masses - Ready for Take-off
    Country/TerritoryUnited States
    CityNew Orleans, LA
    Period13/03/0517/03/05

    Fingerprint

    Dive into the research topics of 'On-line disjoint path routing for network capacity maximization in ad hoc networks'. Together they form a unique fingerprint.

    Cite this