Performance of ad hoc networks with two-hop relay routing and limited packet lifetime (extended version)

Ahmad Al Hanbali*, Philippe Nain, Eitan Altman

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

44 Scopus citations


We consider a mobile ad hoc network consisting of three types of nodes (source, destination and relay nodes) and using the two-hop relay routing. This type of routing takes advantage of the mobility and the storage capacity of the nodes, called the relay nodes, in order to route packets between a source and a destination. Packets at relay nodes are assumed to have a limited lifetime in the network. Nodes are moving inside a bounded region according to some random mobility model. Closed-form expressions and asymptotic results when the number of nodes is large are provided for the packet delivery delay and for the energy needed to transmit a packet from the source to its destination. We also introduce and evaluate a variant of the two-hop relay protocol that limits the number of generated copies in the network. Our model is validated through simulations for two mobility models (random waypoint and random direction mobility models), and the performance of the two-hop routing and of the epidemic routing protocols are compared.

Original languageEnglish
Pages (from-to)463-483
Number of pages21
JournalPerformance Evaluation
Issue number6-7
StatePublished - Jun 2008
Externally publishedYes

Bibliographical note

Funding Information:
The authors acknowledge the support of the European IST project BIONETS and of the Network of Excellence (NoE) EuroNGI.


  • Delay tolerant network
  • Limited packet lifetime
  • Mobile ad hoc network
  • Mobility model
  • Performance analysis
  • Two-hop relay protocol

ASJC Scopus subject areas

  • Software
  • Modeling and Simulation
  • Hardware and Architecture
  • Computer Networks and Communications


Dive into the research topics of 'Performance of ad hoc networks with two-hop relay routing and limited packet lifetime (extended version)'. Together they form a unique fingerprint.

Cite this