GPS-based geographic addressing, routing, and resource discovery
Communications of the ACM
Weak duplicate address detection in mobile ad hoc networks
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
MIPMANET: mobile IP for mobile ad hoc networks
MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
Automated Configuration of TCP/IP with DHCP
IEEE Internet Computing
A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
Merging and partitioning in ad hoc networks
ISCC '04 Proceedings of the Ninth International Symposium on Computers and Communications 2004 Volume 2 (ISCC"04) - Volume 02
SAAMAN: Scalable Address Autoconfiguration in Mobile Ad Hoc Networks
Journal of Network and Systems Management
An efficient and robust addressing protocol for node autoconfiguration in ad hoc networks
IEEE/ACM Transactions on Networking (TON)
Hi-index | 0.00 |
Ad hoc networks allow to create very dynamic communication systems, which are independent from any fixed infrastructure. One of the most important issues regarding the management of an ad hoc network is the configuration of the system according to the way users move. Since a centralized control structure does not exist, we need to determine how the IP addresses must be assigned to the nodes in the network. This task becomes more complex since the nodes can connect or disconnect unexpectedly, and the topology of the network changes throughout the time. Furthermore, a network can split into two or more parts and even merging of different networks may occur. In this work, we have addressed these issues through our new protocol, named AIPAC, for configuration and management of IP addresses in a large and highly mobile ad hoc network. The performances of this solution are evaluated through the NS2 simulator, which allowed us to check the correctness of the protocol and to estimate the control traffic generated under different operating conditions.