Scalable Service Discovery in Mobile Ad Hoc Networks

  • Uday Mohan
  • Kevin C. Almeroth
  • Elizabeth M. Belding-Royer
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3042)


Recent advances in hardware technology and wireless networking have made it possible to deploy large scale ad hoc networks[1]. As these networks begin to grow in size, an efficient mechanism is needed to locate services distributed within them. Protocols such as the Service Location Protocol (SLP)[2] and Universal Plug and Play (UPnP)[3] exist for service discovery in static networks. These protocols are based on a centralized server where services can register themselves and clients can query for them. However, maintaining such a server in an ad hoc network is difficult as nodes randomly join and leave the network. In this paper we study the problems associated with service discovery by first simulating two well known service discovery techniques and investigating their limitations for large network sizes. We then combine the best features of each approach to present an innovative, scalable mechanism. We simulate and analyze this mechanism and show it to scale well for large network sizes without increasing the latencies in locating a service.


  1. 1.
    Intel Team: Largest Tiny Network, (2001)
  2. 2.
    J. Veizades, E. Guttman, C. Perkins, S. Kaplan: SLP: Service Location Protocol. Internet Engineering Task Force : RFC 2165 (1997)Google Scholar
  3. 3.
    Consortium Members of the UPnP Forum: Universal Plug and Play Device Architecture. Version 0.91. (2000)
  4. 4.
    S. R. Das, C. E. Perkins, E. M. Beiding-Royer: Performance comparison of two on-demand routing protocols for ad hoc networks. In: Proceedings of the IEEE Conference on Computer Communications (INFOCOM), Tel Aviv, Israel. (2000)Google Scholar
  5. 5.
    L. Cheng: Service advertisement and discovery in mobile ad hoc networks. In: Workshop on Ad hoc Communications and Collaboration in Ubiquitous Computing Environments. (2002)Google Scholar
  6. 6.
    C. E. Perkins, H. Harjono: Resource discovery protocol for mobile computing. In: IFIP World Conference on Mobile Communications. (1996)Google Scholar
  7. 7.
    K. Arnold, A. Wollrath, B. O’Sulliva, R. Scheifler, J. Waldo: The Jini specification. Addison-Wesley,Reading, MA, USA (1999)Google Scholar
  8. 8.
    Members of the Salutation Consortium: Salutation Consortium Homepage. (2000)
  9. 9.
    M. Ripeanu: Peer-to-peer architecture case study: Gnutella network. In: Proceedings of International Conference on Peer-to-peer Computing. (2001)Google Scholar
  10. 10.
    X. Zeng, R. Bagrodia, M. Gerla: GloMoSim: A library for parallel simulation of large-scale wireless networks. In: Workshop on Parallel and Distributed Simulation. (1998)Google Scholar
  11. 11.
    T. Camp, J. Boleng, V. Davies: A survey of mobility models for ad hoc network research. In: Wireless Communications and Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications. (2002)Google Scholar
  12. 12.
    C. E. Perkins, E. M. Beiding-Royer, S. R. Das: IP broadcast in ad hoc mobile networks. IETF Internet Draft, draft-ietf-manet-bcast-02.txt,(Work in Progress) (2001)Google Scholar
  13. 13.
    N. H. Vaidya: Weak duplicate address detection in mobile ad hoc networks. In: The Third ACM International Symposium on Mobile Ad Hoc Networking and Computing(MOBIHOC). (2002)Google Scholar
  14. 14.
    H. Schulzrinne, S. Casner, R. Frederick, V. Jacobson: RTP: A transport Protocol for Real-Time Applications. Internet Engineering Task Force : RFC 1889 (1996)Google Scholar
  15. 15.
    F. Lau, S. H. Rubin, M. H. Smith, L. Trajovic: Distributed denial of service attacks. In: IEEE International Conference on Systems, Man, and Cybernetics. (2000)Google Scholar
  16. 16.
    S. Marti, T. J. Giuli, K. Lai, M. Baker: Mitigating routing misbehavior in mobile ad hoc networks. In: 6th Annual International Conference on Mobile Computing and Networking (MOBICOM). (2000)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Uday Mohan
    • 1
  • Kevin C. Almeroth
    • 1
  • Elizabeth M. Belding-Royer
    • 1
  1. 1.Department of Computer ScienceUniversity of CaliforniaSanta Barbara

Personalised recommendations