Skip to main content

Mobility Management in MANETs: Exploit the Positive Impacts of Mobility

  • Chapter
  • First Online:
Guide to Wireless Ad Hoc Networks

Part of the book series: Computer Communications and Networks ((CCN))

Abstract

The question of whether mobility is a blessing (Burleigh et al., IEEE Communications Magazine, 41:128–136, 2003; Capkun et al., Proc. of ACM MobiHoc, 2003) or a curse (Zhang et al., Proc. of ACM MobiHoc, 2005) to ad hoc networks has attracted a significant amount of research interest. Some researchers argue that mobility is a hurdle, as it makes the routing, naming and addressing, and location services more challenging. Some new mechanisms such as Zhang et al. (Proc. of ACM MobiHoc, 2005) have been proposed to tackle the problems caused by node mobility in MANETs. Others argue that far?from being a hurdle, mobility can be exploited to increase the system performance. Carefully designed protocols may exploit the mobility to obtain advantages in many important aspects of ad hoc networks, such as network capacity, security, and information dissemination.

This chapter surveys the impact of mobility in ad hoc networks from a wide perspective. We refrain from going into minute details of mobility, and instead?head for giving a broader picture. The goal of this chapter is to endorse new approaches to employ mobility in ad hoc networks based on the current situation and show why mobility can help in many different aspects (Cooper et?al., Proc. of IEEE MASCOTS, 2005; Camp et al., Wireless Communications and Mobile Computing, 2(5):483–502, 2002).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. A. Agarwal and P. R. Kumar. Capacity bounds for ad-hoc and hybrid wireless networks. In Proc. of ACM SIGCOMM, 2004.

    Google Scholar 

  2. A. Vahdat and D. Becker, Epidemic routing for partially-connected ad hoc networks, Technical Report, Duke University, 2002.

    Google Scholar 

  3. B. Liu, P. Brass, O. Dousse, P. Nain, and D. Towsley. Mobility improves coverage of sensor networks. In Proc. of ACM MobiHoc, 2005.

    Google Scholar 

  4. C. E. Perkins and E. M. Royer. Ad-hoc on-demand distance vector routing. In Proc. of IEEE WMCSA, 1999.

    Google Scholar 

  5. D. Austin, W. Bowen, and J. McMillan. Intraspecific variation in movement patterns: modeling individual behaviour in a large marine predator. In Proc. of ACM SIGCOMM, 2004.

    Google Scholar 

  6. D. B. Johnson. Routing in ad hoc networks of mobile hosts. In Proc. of the Workshop on Mobile Computing Systems and Applications, 1994.

    Google Scholar 

  7. D. Cooper, P. Ezhilchelvan, I. Mitrani, and E. Vollset. Optimization of encounter gossip propagation in mobile ad-hoc networks. In Proc. of IEEE MASCOTS, 2005.

    Google Scholar 

  8. DTN research group. In http://www.dtnrg.org/.

  9. F. Bai, N. Sadagopan, and A. Helmy. Important: a framework to systematically analyze the impact of mobility on performance of routing protocols for ad hoc networks. In Proc. of IEEE INFOCOM, 2003.

    Google Scholar 

  10. F. Bai, N. Sadagopan, and A. Helmy. Brics: a building-block approach for analyzing routing protocols in ad hoc networks – a case study of reactive routing protocols. In Proc. of IEEE ICC, 2004.

    Google Scholar 

  11. F. Li and J. Wu. Mobility reduces uncertainty in manets. In Proc. of IEEE INFOCOM, 2007.

    Google Scholar 

  12. Garmin website. In http://www.garmin.com/.

  13. J. Chiang and Y. Hu. Extended abstract: cross-layer jamming detection in wireless broadcast networks. In Proc. of ACM MobiCom, 2007.

    Google Scholar 

  14. J. Haas. A new routing protocol for the reconfigurable wireless networks. In Proc. of IEEE 6th International Conference on Universal Personal Communications, 1997.

    Google Scholar 

  15. J. Wu, S. Yang, and F. Dai. Logarithmic store-carry-forward routing in mobile Ad Hoc networks. IEEE Transactions on Parallel and Distributed Systems, 18(6):735–748, 2007.

    Google Scholar 

  16. M. Grossglauser and M. Vetterli. Locating nodes with EASE: Mobility diffusion of last encounters in Ad Hoc networks, In Proc. of IEEE Infocom, 2003.

    Google Scholar 

  17. M. Grossglauser and D. Tse. Mobility increases the capacity of ad-hoc wireless networks. In Proc. of IEEE INFOCOM, 2001.

    Google Scholar 

  18. Mit trace. In http://nms.lcs.mit.edu/mbalazin/wireless/.

  19. P. Gupta and P. Kumar. The capacity of wireless networks. IEEE Transactions on Information Theory, 46(2):388–404, 2000.

    Article  MathSciNet  MATH  Google Scholar 

  20. Q. Li and D. Rus, Sending messages to mobile users in disconnected ad-hoc wireless networks. In Proc. ACM MobiCom, 2000.

    Google Scholar 

  21. R. Atkinson, C. Rhodes, D. Macdonald, and R. Anderson. Scale-free dynamics in the movement patterns of jackals. In OIKIS, 98:134–140, 2002.

    Article  Google Scholar 

  22. S. Burleigh, A. Hooke, L. Torgerson, K. Fall, V. Cerf, B. Durst, K. Scott, and H. Weiss. Delay-tolerant networking: an approach to interplanetary internet. In IEEE Communications Magazine, 41:128–136, 2003.

    Article  Google Scholar 

  23. S. Capkun, J. Hubaux, and L. Buttyán. Mobility helps security in ad hoc networks. In Proc. of ACM MobiHoc, 2003.

    Google Scholar 

  24. S. Capkun, M. Cagalj, and M. Srivastava. Securing localization with hidden and mobile base stations. In Proc. of IEEE INFOCOM, 2006.

    Google Scholar 

  25. T. Camp, J. Boleng, and V. Davies. A survey of mobility models for ad hoc network research. Wireless Communications and Mobile Computing, 2(5):483–502, 2002.

    Article  Google Scholar 

  26. W. Zhang, H. Song, S. Zhu, and G. Cao. Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks. In Proc. of ACM MobiHoc, 2005.

    Google Scholar 

  27. W. Zhao, M. Ammar, and E. Zegura, A message ferrying approach for data delivery in sparse mobile ad hoc networks, In Proc. ACM MobiHoc, 2004.

    Google Scholar 

  28. W. Zhao, M. Ammar, and E. Zegura, Controlling the mobility of multiple data transport ferries in a delay-tolerant network, In Proc. IEEE INFOCOM, 2005.

    Google Scholar 

  29. X. Hong, M. Gerla, G. Pei, and C. Chiang. A group mobility model for ad hoc wireless networks. In Proc. of ACM/IEEE MSWiM, 1999.

    Google Scholar 

  30. Zebranet website. In http://www.princeton.edu/mrm/zebranet.html.

Download references

Acknowledgments

This work was supported in part by NSF grants CCR 0329741, CNS 0422762, CNS 0434533, CNS 0531410, and CNS 0626240. Contact information: Jie Wu, (561)297-3855, Fax: (561)297-2800, jie@cse.fau.edu.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Feng Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag London Limited

About this chapter

Cite this chapter

Li, F., Yang, Y., Wu, J. (2009). Mobility Management in MANETs: Exploit the Positive Impacts of Mobility. In: Misra, S., Woungang, I., Chandra Misra, S. (eds) Guide to Wireless Ad Hoc Networks. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-84800-328-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-1-84800-328-6_9

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84800-327-9

  • Online ISBN: 978-1-84800-328-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics