Advertisement

Autonomic Wireless Network Management

  • Kai Zimmermann
  • Sebastian Felis
  • Stefan Schmid
  • Lars Eggert
  • Marcus Brunner
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3854)

Abstract

This paper presents a decentralized approach for the autonomic management of a group of collaborating base stations to provide efficient and effective wireless network access in highly dynamic environments. It provides a management platform that supports many different management functions based on common mechanisms for information exchange, transactional semantics and security. A central feature of the system is the inclusion of monitored feedback information into the autonomic management process, which can enhance the operation of the management system and the quality of its decisions. An integrated monitoring component provides this feedback information by monitoring the coverage area and analyzing the measurements in real time. A preliminary evaluation of the prototype implementation shows that the autonomic management system scales well. Performance is mostly proportional to the diameter of the network topology and does not heavily depend on the number of base stations present. Further experiments with the wireless monitoring sub-system demonstrate that it is feasible to automatically detected network problems caused by radio interference or active attacks.

Keywords

Wireless Network Wireless Access Network Autonomic Management Wireless Monitoring Autonomic Principle 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Airespace Corporation: Putting the Air Space to Work. White Paper (2003)Google Scholar
  2. 2.
    Aruba Wireless Networks: Getting a Grip on Wireless LANs. White Paper (2003)Google Scholar
  3. 3.
    Toh, C.-K.: Ad Hoc Mobile Wireless Networks, Protocols and Systems. Prentice Hall Inc., New Jersey (2002)Google Scholar
  4. 4.
    Ji, L., Agre, J., Iwao, T., Fujino, N.: On Providing Secure and Portable Wireless Data Networking Services: Architecture and Data Forwarding Mechanisms. In: Proc. International Conference on Mobile Computing and Ubiquitous Networking (ICMU 2004), Japan (2004)Google Scholar
  5. 5.
    Advanced Cybernetics Group and Meshdynamics: Challenges for 802.15 WPAN Mesh. White Paper (2004)Google Scholar
  6. 6.
    Zhang, H., Arora, A.: GS3: scalable self-configuration and self-healing in wireless networks. In: Proc. 21st Annual Symposium on Principles of Distributed computing, Monterey, California, USA, pp. 58–67 (2002)Google Scholar
  7. 7.
    Krishnamachari, B., Wicker, S.B., Bejar, R., Fernandez, C.: On the Complexity of Distributed Self-Configuration in Wireless Networks. Telecommunication Systems 22(1-4), 33–59 (2003)CrossRefGoogle Scholar
  8. 8.
    Mullany, F.J., Ho, L.T.W., Samuel, L.G., Claussen, H.: Self-Deployment, Self-Configuration: Critical Future Paradigms for Wireless Access Networks. In: Proc. of 1st International Workshop on Autonomic Communications (WAC 2005), Berlin, Germany (2004)Google Scholar
  9. 9.
    Ho, L.T.W., Samuel, L.G., Pitts, J.M.: Applying Emergent Self-Organizing Behaviour for the Coordination of 4G Networks Using Complexity Metrics. Bell Labs Technical Journal 8(1), 5–26 (2003)CrossRefGoogle Scholar
  10. 10.
    Trapeze Networks: Defining An Integrated Access Point. White Paper (2004)Google Scholar
  11. 11.
    Kephart, J., Chess, D.: The Vision of Autonomic Computing. IEEE Computer Magazine (2003)Google Scholar
  12. 12.
    Zimmerman, K.: An Autonomic Approach for Self-Organising Access Points. Diploma Thesis, University of Ulm, Germany (2004)Google Scholar
  13. 13.
    Silva Tobella, J.J., Stiemerling, M., Brunner, M.: Towards Self-Configuration of IPv6 Networks. In: Proc. Poster Session of IEEE/IFIP Network Operations and Management Symposium (NOMS 2004), Seoul, Korea (2004)Google Scholar
  14. 14.
    Wright, J.: Detecting Wireless LAN MAC Address Spoofing. White Paper (2003)Google Scholar
  15. 15.
    Wright, J.: Layer 2 Analysis of WLAN Discovery Applications for Intrusion Detection. White Paper (2002)Google Scholar
  16. 16.
    IEEE: IEEE Organizationally Unique Identifier (OUI) List (December 2004)Google Scholar
  17. 17.
    Demers, A., et al.: Epidemic algorithms for replicated database maintenance. In: Proc. 6th ACM Sympos. on Principles of Distributed Computing, Vancouver, Canada, pp. 1–12 (1987)Google Scholar
  18. 18.
    Tanenbaum, A., van Steen, M.: Distributed Systems, Principles and Paradigms. Prentice Hall Inc., NJ, USA (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Kai Zimmermann
    • 1
  • Sebastian Felis
    • 1
  • Stefan Schmid
    • 1
  • Lars Eggert
    • 1
  • Marcus Brunner
    • 1
  1. 1.Network LaboratoriesNEC Europe Ltd.HeidelbergGermany

Personalised recommendations