簡易檢索 / 詳目顯示

研究生: 黃嘉威
Chia-wei Huang
論文名稱: 無線網格網路上廣域式異常診斷技術之研究
Network-Wide Fault Diagnosis in Wireless Mesh Networks
指導教授: 陳郁堂
Yie-tarng Chen
口試委員: 林銘波
Ming-bo Lin
方文賢
Wen-hsien Fang
徐俊傑
Chiun-chieh Hsu
學位類別: 碩士
Master
系所名稱: 電資學院 - 電子工程系
Department of Electronic and Computer Engineering
論文出版年: 2007
畢業學年度: 95
語文別: 英文
論文頁數: 41
中文關鍵詞: 主成分分析隱馬可夫模型異常診斷無線網格網路
外文關鍵詞: Principal Component Analysis, Hidden Markov Model, Fault Diagnosis, Wireless Mesh Networks
相關次數: 點閱:127下載:1
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 無線網格網路技術的出現成為了未來無線骨幹網路的重要技術,但是對於無線網格網路上異常診斷的研究卻很有限。除此之外,無線環境的不穩定特性以及網格網路的多跳躍特性更增加異常診斷的挑戰性。在本論文中,我們研究用應於無線網格網路上的廣域式異常診斷技術。本篇論文將異常診斷分為三個步驟,首先偵測出異常時間點,接著識別出異常網路節點,最後診斷異常網路節點的異常原因。我們運用主成分分析的方式將某個時間槽內的觀測資料區分出正常成分與異常成分,依此偵測異常時間點與識別異常網路節點,最後利用隱馬可夫模型進行異常原因分類。模擬結果顯示我們的方法能正確及有效的找出異常時間點,識別異常網路節點以及診斷異常原因。


    Wireless mesh networks have emerged a key technology for next-generation broadband wireless access. However, research on fault diagnosis in wireless mesh network is limited. On the other hand, the unreliable characteristic of wireless channels poses fault diagnosis in wireless mesh networks a challenge issue. In this research, we investigate network-wide fault diagnosis schemes for wireless mesh network. The fault diagnosis can be divided into three steps: The first step is detecting abnormal time points; the second step is identifying abnormal mesh nodes; the final step is diagnosing the fault type of each abnormal node. We use subspace approach to separate normal space and abnormal space and use Hidden Markov Model for fault modeling. The simulation result shows that our fault diagnosis can achieve high accuracy in detection, identification and diagnosis.

    1. INTRODUCTION 1 1.1. Wireless Mesh Networks 1 1.2. Motivation 2 1.3. Problem Statement 3 1.4. Goal 4 1.5. Related Work 4 1.6. Contribution 5 2. FAULT DIAGNOSIS ARCHITECTURE IN WIRLESS MESH NETWORKS 7 2.1. Centralized Fault Diagnosis Architecture 8 2.2. Distributed Fault Diagnosis Architecture 9 3. FAULT DIAGNOSIS APPROACH 11 3.1. Major Concept 11 3.2. Features for Fault Diagnosis 12 3.3. Subspace Construction via Principal Component Analysis 14 3.4. The Detection Step 16 3.5. The Identification Step 17 3.6. Fault Modeling by Hidden Markov Model 20 3.7. The Diagnosis Step 21 4. PERFORMANCE EVALUATION 23 4.1. Methodology 23 4.2. Performance Metrics 25 4.3. Experimental Result 26 5. CONCLUSION 29 REFERENCE 30

    [1] A. Lakhina, M. Crovella, C. Diot. Diagnosing Network-Wide Traffic Anomalies. In ACM SIGCOMM, August 2004.
    [2] A Lakhina, M Crovella, C Diot. Mining anomalies using traffic feature distributions. In Proceedings of Applications, technologies, architectures, and protocols for computer communications, 2005.
    [3] ML Shyu, SC Chen, K Sarinnapakorn, LW Chang. A Novel Anomaly Detection Scheme Based on Principal Component Classifier. In Proceedings of the IEEE Foundations and New Directions of Data Mining Workshop, 2003.
    [4] R. Dunia and S. J. Qin. A Subspace Approach to Multidimensional Fault
    Identification and Reconstruction. In American Institute of Chemical Engineers (AIChE) Journal, pages 1813–1831, 1998.
    [5] A. Raniwala, Tzi-cker Chiueh. Architecture and Algorithms for an IEEE 802.11-Based Multi-Channel Wireless Mesh Network. In Proc. of IEEE INFOCOM, 2005.
    [6] A. Adya, P. Bahl, R. Chandra, and L. Qiu. Architecture and techniques for
    diagnosing faults in IEEE 802.11 infrastructure networks. In Proc .of ACM MobiCom, Sept. 2004.
    [7] L Qiu, P Bahl, A Rao, L Zhou. Troubleshooting Wireless Mesh Networks. In ACM SIGCOMM Computer Communication Review, 2006.
    [8] A. Sheth, C. Doerr, D. Grunwald, R. Han, D. Sicker. MOJO: A Distributed Physical Layer Anomaly Detection System for 802.11 WLANs. In Proc. of ACM MobiSys, June. 2006.
    [9] R. Chandra, V. N. Padmanabhan, Ming Zhang. WiFiProfiler: cooperative diagnosis in wireless LANs. In Proc. of ACM MobiSys, June. 2006.
    [10] AirDefense. Wireless LAN Security. http://airdefense.net.
    [11] AirMagnet. AirMagnet Distributed System. http://airmagnet.com.
    [12] AirWave. AirWave Management Platform. http://airwave.com.
    [13] AirTight Networks. http://www.airtightnetworks.net.
    [14] Aruba Networks. http://www.arubanetworks.com/.
    [15] NS-2. http://www.isi.edu/nsnam/ns/
    [16] L, R. Rabiner. A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition. In Proceedings of the IEEE, vol. 77,no.2, pp 257~286, 1989.

    QR CODE