StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Wireless ad hoc network management - Essay Example

Cite this document
Summary
Our organization runs an ad hoc wireless network system.At the present moment,and consequent to problems which arose from previous network management systems,the organization is engaged in the implementation of a policy-based management framework for wireless ad hoc networks with focus on Quality of Service management…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.8% of users find it useful
Wireless ad hoc network management
Read Text Preview

Extract of sample "Wireless ad hoc network management"

1 Introduction Our organization runs an ad hoc wireless network system. At the present moment, and consequent to problems which arose from previousnetwork management systems, the organization is engaged in the implementation of a policy-based management framework for wireless ad hoc networks with focus on Quality of Service [QoS] management. Until the completion of implementation, the ICT director informed me that the questions I was posing were irrelevant. They were irrelevant because they were related to operational automatic network management systems, currently not in place in our organization. Accordingly, the information collected from the ICT director, and which determined the direction of this report, centered around the management of wireless ad hoc networks and policy-based management frameworks. 2 Wireless Ad Hoc Network Management In designing and deciding upon a wireless ad hoc network management system, it is important to keep an eye on the desirable operational features sought in a management system for deployment in a wireless ad hoc network environment. These features, as elucidated by the ICT director and supported in the literature on the topic, are discussed below. 2.1 Efficient Signaling Mechanism According to Tian and Cox (2004), any network management system involves a certain amount of additional control traffic to regulate the various operational characteristics of the network. In bandwidth-constrained wireless networks, it is extremely important to minimize this signaling overhead, ensuring that the links are not congested with management traffic. Thus, as Cardei, Cardei and Du (2005) emphasize, the constrained bandwidth in wireless ad hoc networks greatly influences the choice of the mechanisms or protocols used for the various managerial tasks. 2.2 Lightweight Ad hoc networks generally have nodes with limited battery life, and may have limited storage and/or processing capabilities (Zhang, Hu and Fujisu, 2006). Hence, as emphasized by the ICT director, the organization needs a management system that does not burden the resource-limited network nodes with undue storage and processing requirements. Efficient signaling and minimal computation requirements will substantially alleviate the demand on the limited battery power. 2.3 Automated, Intelligent and Self-Organizing The ability for self-organization is one of the key aspects in the successful deployment of any application in an ad hoc network environment. Indeed, as our ICT Director stressed, given the dynamic nature of most ad hoc networks, an adaptive management framework that automatically reacts to changes in network conditions is required. In order to accomplish this, the management system should be able to automatically learn about the diverse capabilities of the nodes involved, and use this information as one of the criteria to assign appropriate roles to the different types of nodes. The implication here is that, as Zhang, Hu, and Fujisu (2006) stress, dynamic policies need to be supported for automated network control based on dynamic re-evaluation of communication capabilities and assets of an ad hoc network. 2.4 Secure and Robust Finally, an ad hoc network management system should be secure and robust. It should allow secure exchange of management data among authorized users, and enhance the overall survivability of the network (ICT Director). This may require the means to authenticate and authorize users, and support encryption capabilities. In addition, the system should allow reliable transmission of management data with means to detect failure and provide fault-tolerance (ICT Director). 3.0 Policy-Based Network Management In designing and deciding upon our network management architecture, our ICT Department was guided by the concerns outlined in the preceding section. Using these concerns as a roadmap for the determination of the format of our organization's ideal network management system, the ICT department identified policy-based network systems as the optimal option. The reason lies in that the aforementioned network management system facilitates the implementation of QoS. According to our ICT Director, the design of our network management system was driven by the imperatives of implementing QoS. Indeed, the importance of a network management system which embraces QoS is attested to in the literature on wireless as hoc network management. According to this literature, one approach for QoS provisioning and management in the Internet that has met with considerable interest in the networking community is Policy-Based Network Management (PBNM) (Randhawa and Hardy, 2001; Tian and Cox, 2004; Cardei, Cardei and Du, 2005; Zhang, Hu, and Fujisu, 2006). A pilot implementation in our organization confirmed Zhang, Hu, and Fujisu's (2006) statement that PBNM configures and controls the network as a whole, providing the network operator with a simplified, logically centralized and automated control over the entire network. PBNM has made administration of complex operational characteristics of a network, such as Quality of Service (QoS), access control, network security, dynamic IP address allocation, much easier. The advantages of policy-based network system, according to our ICT Director, primarily lie in its Policy Management Tool (PMT). As Tian and Cox (2004) explain, PMT provides the network administrator with an interface to interact with the network. A network administrator uses the policy management tool to define the various policies or policy groups. It is typically the function of the PMT to validate the syntactic and semantic correctness of the administrator input, to ensure consistency among the high-level policies and to check for compatibility of the various policies. Further, the PMT typically determines the association between the policies and the various network elements where these policies are to be enforced, determines which low-level policies can be used to support the specified high-level policies and ensures that the specified policies are comprehensive enough to cover all the relevant scenarios. The policies specified at the PMT are then stored in a policy repository (Tian and Cox, 2004). A policy repository, according to Cardei, Cardei and Du (2005), can be defined as a data store or a model abstraction that holds policy rules, their conditions and actions, and related policy data. Its advantage, as our ICT Director emphasized, lies in its facilitation of data management, network policy and rule management and operationalization and, above all, its provision of QoS. It is, thus, that the organization finally settled on the implementation of a PBNM system. 4.0 Conclusion On the basis of the information presented in this report, it is evident that decisions pertaining to the design of a network management system are highly complex and complicated. They must be founded upon an accurate assessment of the organization's needs versus the advantages and disadvantages of the available network management systems, on the one hand, and the nature of the network in place, on the other. Even then, as our ICT director emphasized, final decisions cannot be rendered without a pilot testing of the network management system in question. This was the path that our organization pursued in its design and decision to implement a PBNM system. References Cardei, M., Cardei, I. and Du, D. (2005). Resource Management in Wireless Networking (Network Theory and Applications. New York: Springer. Randhawa, T.S. and Hardy, S. (2001) Network Management Systems in Wired and Wireless Networks. New York: Springer. Tian, K.Q. and Cox, D.C. (2004). Mobility Management in Wireless Networks: Data Replication Strategies and Applications (ERCOFTAC). New York: Springer. Zhang, Y., Hu, H. and Fujisu, M. (2006). Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications. Boca Raton: Taylor and Francis. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Wireless ad hoc network management Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Wireless ad hoc network management Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1534474-wireless-ad-hoc-network-management
(Wireless Ad Hoc Network Management Essay Example | Topics and Well Written Essays - 1000 Words)
Wireless Ad Hoc Network Management Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1534474-wireless-ad-hoc-network-management.
“Wireless Ad Hoc Network Management Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1534474-wireless-ad-hoc-network-management.
  • Cited: 0 times

CHECK THESE SAMPLES OF Wireless ad hoc network management

Mobility Management

The primary object of the present assignment to provide a mobility management method and a mobility management system for wireless data networks to precisely determine the timing that a mobility management state switches from the ready state to the standby state, and effectively resolve the synchronization problem between the mobile phone and SGSN.... Mobility management is one of the major functions of a GSM or a UMTS network that allows mobile phones to work....
4 Pages (1000 words) Essay

The Advantages and Benefits of the Wireless Networks

t is very essential that the authorities had the responsibility of deploying the wireless network are aware of the solutions they are seeking from the new network that is not readily available in the traditional wired network architecture (Trulove, 2002).... lanning of the network set up determines the best-suited WLAN architectural adoption with regards to the surrounding environment (Syngress, 2002).... he site survey is critical before expansion and deployment of the network it enables identification of appropriate technologies to deploy, elimination and avoidance of obstacles, user needs, capacity required to carry out the exercise, expertise needed, area coverage, and resources required to successfully ensure project implementation up to its decommissioning....
7 Pages (1750 words) Research Paper

Monitoring Offshore Oil and Gas Processes Using Ad-Hoc Wireless Network

Ad-hoc wireless network is suitably suited for offshore oil and gas processes in regard to its ability to circumvent the remote and harsh environmental challenges, in an offshore processing environment.... In offshore oil and gas processes, the choice of a network is rationalized… against its installation and maintenance cost together with its reliability, efficiency and security under a multiplicity of volatile environmental scenarios.... This research explores the enhanced reliability and security of ad-hoc wireless network in the networking of offshore The superiority of ad-hoc wireless network is attributed to their exploitation of a remote, automated and digitally implemented communication system, which circumvent the inefficiencies of an analogue and manual communication system....
4 Pages (1000 words) Research Paper

Analysis to Prove Reservation-based Ad Hoc Wireless Systems is Better in Performance

This paper "Analysis to Prove Reservation-based ad hoc Wireless Systems is Better in Performance" outlines how reservation-based ad hoc wireless systems are better in performance when compared to non-reservation-based systems.... Below many points regarding reservation-based ad hoc wireless systems.... This section analyzes how reservation-based ad hoc wireless systems are better than nonreservation based ad hoc wireless systems....
5 Pages (1250 words) Research Paper

Security Solutions for Mobile Ad-hoc Networks Including the Development of IDS

The paper "Security Solutions for Mobile Ad-hoc Networks Including the Development of IDS" states that mobile ad hoc networks have the capability to establish networks on the air in possible harsh situations where is not possible to set-up customary network arrangements.... This paper presents a comprehensive analysis of mobile ad hoc security issues and offers security solutions for MANETs (mobile ad-hoc networks) including the development of IDS (Intrusion Detections System)....
15 Pages (3750 words) Research Paper

Wireless Networks Communication

Beyond the IT personnel, which is by far a critical group, various other participants – customers, management, administrators, finance – are involved directly, with the stakeholders initiating the planning process (Sayre,2008).... The factors include improved and more efficient network access, support for omnipresent network access, easier mobility for the IT department, and return on investment to the management of the company.... n order to have a successful wireless network implementation, different functional departments and divisions of a company must come together and support the effort....
7 Pages (1750 words) Essay

Wireless Network Capabilities

This essay “Wireless network Capabilities” focuses on the technical capabilities of the recent advancements in wireless networks and the feasibility of using a new handset product known as HyperSlim PX on such wireless computing and networking capabilities.... hellip; The author states that the past few decades have witnessed a tremendous growth in the population of wireless network users who are increasingly demanding high performance and reliability of wireless computing and networking services....
12 Pages (3000 words) Essay

Wireless Networks: Technology and Applications

The wireless network has standards that help to regulate the connections that are seen in the wireless networks.... The wireless network has standards that help to regulate the connections that are seen in the wireless networks.... Bluetooth is in the range of application devices known as WPAN (Wireless Personal Area network).... This is one of the disadvantages that come with Bluetooth as it brings interference to this network....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us