Autonomic and decentralized management of wireless access networks

In this article, we apply autonomic and distributed management principles to wireless access networks. Most interesting is the application of autonomic properties and behaviors including adaptive, aware, and automatic operation in a decentralized setting. In particular, we present a generic and autonomic management architecture for decentralized management of wireless access networks, such as GERAN/UTRAN, E-UTRAN, WiMAX or WLAN. For evaluation purposes, we apply this architecture to the management of a Wireless LAN network, and we evaluate the architecture and some of the autonomic management functions through simulations, a prototype implementation and the setup of a real-world testbed for experimentation with the proposed management approach.

[1]  Martin Stiemerling,et al.  Towards self-configuration of IPv6 networks , 2004, 2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507).

[2]  Marcus Brunner,et al.  Generic Monitoring and Intervention on Self-Configuring Networks , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.

[3]  Seung-Jae Han,et al.  Cell Breathing Techniques for Load Balancing in Wireless LANs , 2006, IEEE Transactions on Mobile Computing.

[4]  Hongwei Zhang,et al.  GS3: scalable self-configuration and self-healing in wireless networks , 2002, PODC '02.

[5]  Chai-Keong Toh,et al.  Ad Hoc Mobile Wireless Networks , 2002 .

[6]  Jeffrey O. Kephart,et al.  The Vision of Autonomic Computing , 2003, Computer.

[7]  M. J. Maullo,et al.  Policy management: an architecture and approach , 1993, Proceedings of 1993 IEEE 1st International Workshop on Systems Management.

[8]  Holger Claussen,et al.  Self-deployment, Self-configuration: Critical Future Paradigms for Wireless Access Networks , 2004, WAC.

[9]  Andrew S. Tanenbaum,et al.  Distributed systems: Principles and Paradigms , 2001 .

[10]  Chai-Keong Toh,et al.  Ad Hoc Mobile Wireless Networks , 2002 .

[11]  Stefan Parkvall,et al.  Technical solutions for the 3G long-term evolution , 2006, IEEE Communications Magazine.

[12]  Joshua Wright,et al.  Detecting Wireless LAN MAC Address Spoofing , 2003 .

[13]  Stephen B. Wicker,et al.  On the Complexity of Distributed Self-Configuration in Wireless Networks , 2003, Telecommun. Syst..

[14]  Morris Sloman,et al.  Policies Hierarchies for Distributed Systems Management , 1993, IEEE J. Sel. Areas Commun..

[15]  Joshua Wright Layer 2 Analysis of WLAN Discovery Applications for Intrusion Detection , 2002 .

[16]  Marcus Brunner,et al.  Design and Evaluation of Distributed Load-Balancing for Wireless Networks , 2007, 2007 10th IFIP/IEEE International Symposium on Integrated Network Management.

[17]  Scott Shenker,et al.  Epidemic algorithms for replicated database maintenance , 1988, OPSR.

[18]  Lester T. W. Ho,et al.  Applying emergent self-organizing behavior for the coordination of 4G networks using complexity metrics , 2003, Bell Labs Technical Journal.

[19]  René Wies,et al.  Policies in network and systems management—Formal definition and architecture , 1994, Journal of Network and Systems Management.

[20]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[21]  M. Brunner,et al.  Self-Management of Wireless Base Stations , 2005 .

[22]  Iwao Tadashige,et al.  On Providing Secure and Portable Wireless Data Networking Services : Architecture and Data Forwarding Mechanisms , 2004 .