Self-configuration in MANETs: Different Perspectives

  • Jing Wang
  • R. Venkatesha Prasad
  • Ignas Niemegeers
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4725)


The number ofcommunication devices one uses is increasing day by day. Configuring these devices for optimal functioning, especially Mobile Ad-hoc Networks (MANETs), has not been an easy task for users. Self-configuration of the devices for optimal networking performance, being imperative, has been studied by various researchers considering the tasks at hand in various layers of the network stack. We have made a comprehensive study on self-configuration at different layers, and discussed the required interactions amongst them from different perspectives, which we think important. We break down the design complexity and identify system-level merits with the help of earlier studies. We further present our vision to provide such merits with self-configuration architecture. Our work presented here aims at understanding the potential challenges posed by the newer applications and services, and identifying research directions while providing the foundation for design of self-configurable systems.


Particle Swarm Optimization Cluster Head Service Discovery Mean Opinion Score Configuration Process 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Dobson, S., et al.: Survey of autonomic communications. ACM Transactions on Autonomous and Adaptive Systems 1(2), 223–259 (2006)CrossRefMathSciNetGoogle Scholar
  2. 2.
    Prehofer, C., Bettstetter, C.: Self-organization in communication networks: principles and design paradigms. IEEE Communication Magazine 43(7), 78–85 (2005)CrossRefGoogle Scholar
  3. 3.
    Chatterjee, M., Das, S.K., Turgut, D.: WCA: A weighted clustering algorithm for mobile ad hoc networks. Journal of Clustering Computing (Special Issue on Mobile Ad Hoc Networks 5(2), 192–204 (2002)Google Scholar
  4. 4.
    Ji, C., Zhang, Y., Gao, S., Yuan, P., Li, Z.: Particle Swarm Optimization for Mobile Ad Hoc Network Clustering. In: Proc. of IEEE ICNSC  (2004)Google Scholar
  5. 5.
    Gavalas, D., Pantziou, G., Konstantopoulos, C., Mamlis, B.: Lowest-ID with adaptive ID reassignment: A novel mobile ad-hoc networks clustering algorithm. In: Proc. of IEEE ISWPC  (2006)Google Scholar
  6. 6.
    McAuley, A.J., Manousakis, K.: Self-configuring Networks. In: Proc. IEEE MILCOM  (2000)Google Scholar
  7. 7.
    Sun, Y., Belding-Royer, E.: Dynamic Address Configuration in Mobile Ad hoc Networks., Technical Report 2003-11, Computer Science Department, UCSB (2003)Google Scholar
  8. 8.
    Nesargi, S., Prakash, R.: MANETconf: Configuration of hosts in a mobile ad hoc network. In: Proc. IEEE INFOCOM  (2002)Google Scholar
  9. 9.
    Thoppian, M.R.: A Protocol for Dynamic Configuration of Nodes in MANET, Master’s thesis, Computer Science, University of Texas at Dallas (August 2002)Google Scholar
  10. 10.
    Perkins, C.E., Malinen, J.T., Wakikawa, R., Belding-Royer, E.M., Sun, Y.: IP address autoconfiguration for ad hoc networks. draft-perkin-manet-autoconf-01.txt, Work in progress  (2001)Google Scholar
  11. 11.
    Zhou, H., Ni, L.M.: Prophet Address Allocation for Large Scale MANETs. In: Proc. IEEE INFOCOM  (2003)Google Scholar
  12. 12.
    Weniger, K.: PACMAN: Passive Autoconfiguration for Mobile Ad hoc Networks. IEEE JSAC Special Issue Wireless Ad hoc Networks 23, 507–519 (2005)Google Scholar
  13. 13.
    Vaidya, N.H.: Weak Duplicate Address Detection in Mobile Ad Hoc Networks. In: ACM MobiHoc, ACM Press, New York (2002)Google Scholar
  14. 14.
    Sun, Y., Belding-Royer, E.: A study of dynamic addressing techniques in mobile ad hoc networks. Wireless Communications and Mobile Computing 4(3), 315–329 (2004)CrossRefGoogle Scholar
  15. 15.
    Chen, G., Kotz, D.: Context-sensitive resource discovery. In: Proc. IEEE PerCom, IEEE Computer Society Press, Los Alamitos (2003)Google Scholar
  16. 16.
    OMG, Naming service specification (October 2004),
  17. 17.
    Tyan, J., Mahmoud, Q.H.: A network layer based architecture for service discovery in mobile ad hoc networks. In: Proc. IEEE CCECE-CCGEI  (2004)Google Scholar
  18. 18.
    Ververidis, C.N., Polyzos, G.C.: Extended ZRP: a routing layer based service discovery protocol for mobile ad hoc networks. In: Proc. MobiQuitous (2005)Google Scholar
  19. 19.
    Liu, J., Issarny, V.: Signal Strength based service discovery in mobile ad hoc networks. In: Proc. IEEE PIMRC  (2005)Google Scholar
  20. 20.
    Jacobsson, M., Niemegeers, I.: Privacy and anonymity in personal networks. In: Proc. IEEE PerSec (2005)Google Scholar
  21. 21.
    White, S.R., Hanson, J.E., Whalley, I., Chess, D.M., Kephart, J.O.: An architectural approach to autonomic computing. In: Proc.IEEE.ICAC  (2004)Google Scholar
  22. 22.
    Poladian, V., Sousa, J.P., Garlan, D., Shaw, M.: Dyanmic Configuration of Resource-aware services. In: Proc. IEEE ICSE  (2004)Google Scholar
  23. 23.
    Abowd, G.D., Dey, A.K., Brown, P.J., Davies, N., Smith, M., Steggles, P.: Towards a Better Understanding of Context and Context-Awareness. In: Proc. ACM HUC  (1999)Google Scholar
  24. 24.
    Shacham, R., Schulzerinne, H., Thakolsri, S., Kellerer, W.: The virtual device: expanding wireless communication services through service discovery and session mobility. In: Proc. IEEE WiMob  (2005)Google Scholar
  25. 25.
    Min, O., Kim, J., Kim, M.: Design of an adaptive streaming system in ubiquitous environment. In: Proc. IEEE ICACT  (February 2006)Google Scholar
  26. 26.
    Phan, T., Xu, K., Guy, R., Bagrodia, R.: Handoff of application session across time and space. In: Proc. IEEE ICC  (2001)Google Scholar
  27. 27.
    Doi, Y., Wakayama, S., Ishiyama, M., Ozaki, S., Ishihara, T., Uo, Y.: Ecosystem of naming systems: discussions on a framework to induce smart space naming systems development. In: Proc. IEEE ARES  (2006)Google Scholar
  28. 28.
    Chess, D., Segal, A., Whalley, I., White, S.: Unity: Experiences with a prototype autonomic computing system. In: Proc. IEEE ICAC (2004)Google Scholar
  29. 29.
    Felegyhazi, M., Buttyan, L., Hubaux, J.P.: Nash equilibriums of packet forwarding strategies in wireless ad hoc network. IEEE Transactions on Mobile Computing  (May 2006)Google Scholar
  30. 30.
    MacKenzie, A.B., Wicker, S.B.: Game theory and the design of self-configuring, adaptive wireless networks. IEEE Communication Magazine 39(11), 126–131 (2001)CrossRefGoogle Scholar
  31. 31.
    Lee, K., Lee, D., Ko., Y., Lee, J., Chung, Y.C.: An objectified naming system for providing context transparency to context-aware applications. In: Proc. IEEE SEUS-WCCIA  (2006)Google Scholar
  32. 32.
    Lenders, V., May, M., Plattner, B.: Service discovery in mobile ad hoc networks: a field theoretic approach. In: Proc. IEEE WoWMoM  (2005)Google Scholar
  33. 33.
    Garyfalos, A., Almeroth, K.C.: Coupons: wild scale information distribution for wireless ad hoc networks. In: Proc. IEEE GLOBECOM  (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Jing Wang
    • 1
  • R. Venkatesha Prasad
    • 1
  • Ignas Niemegeers
    • 1
  1. 1.EEMCS, Delft University of Technology, Mekelweg 4, 2628CD DelftThe Netherlands

Personalised recommendations