Hot/Cold Routing in mobile Ad hoc networks

John Eisbrener, Greg Murphy, David Eade, Christopher K. Pinnow, Kohinoor Begum, Seungjin Park, Seong Moo Yoo, Jong Hoon Youn

Research output: Chapter in Book/Report/Conference proceedingConference contribution


In mobile ad-hoc networks, many routing algorithms rely on some form of flooding to accomplish the route discovery process. Flooding, however, consumes many valuable network resources such as time, bandwidth, and power. Most current routing schemes expire cached routes after a time to account for nodal movement. Expired routes are resources which to this point have been left untapped. This paper proposes a new route discovery method, called Hot/Cold Routing, which directs broadcasts toward the destination node even in the absence of location information. The Hot/Cold Routing scheme reduces the search space for the destination node by implementing an expired route cache that is utilized by each node in the network. Routes are added to the expired route cache as they expire from the active route cache and remain there until some time interval has passed or a new route has been discovered. Since these expired routes can provide valuable insight into finding new routes, Hot/Cold Routing uses them to direct broadcasts toward the destination node. Hot/Cold Routing can save a significant quantity of valuable network resources because only nodes near the optimal path will rebroadcast route requests.

Original languageEnglish (US)
Title of host publicationIEEE Vehicular Technology Conference
Number of pages5
StatePublished - 2004
Event2004 IEEE 60th Vehicular Technology Conference, VTC2004-Fall: Wireless Technologies for Global Security - Los Angeles, CA, United States
Duration: Sep 26 2004Sep 29 2004


Other2004 IEEE 60th Vehicular Technology Conference, VTC2004-Fall: Wireless Technologies for Global Security
Country/TerritoryUnited States
CityLos Angeles, CA

ASJC Scopus subject areas

  • Electrical and Electronic Engineering


Dive into the research topics of 'Hot/Cold Routing in mobile Ad hoc networks'. Together they form a unique fingerprint.

Cite this