帳號:guest(3.236.24.215)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目勘誤回報
作者姓名(中文):蘇威豪
作者姓名(英文):Wei-hao Su
論文名稱(中文):以社交關係為基礎的隨意網路之效能研究
論文名稱(外文):A Network Performance Study for Social Relationship-oriented MANET
指導教授姓名(中文):羅乃維
指導教授姓名(英文):Nai-wei Lo
口試委員姓名(中文):左瑞麟
呂永和
口試委員姓名(英文):Ray-lin Tso
Yung-ho Leu
學位類別:碩士
校院名稱:國立臺灣科技大學
系所名稱:資訊管理系
學號:M9809317
出版年(民國):101
畢業學年度:100
學期:1
語文別:英文
論文頁數:28
中文關鍵詞:友誼機制隨意網路社交關係自私節點社交關係導向之分級機制封包傳遞率
外文關鍵詞:FriendshipMANETSelfish nodeSocial relationship-oriented grading mechanismPacket delivery ratio
相關次數:
  • 推薦推薦:0
  • 點閱點閱:72
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:1
  • 收藏收藏:0
在隨意網路中,節點間交換訊息通常是透過路由協定如AODV、DSR來為節點建立連線,以往路由協定大多是假設節點間訊息的交換是沒有自私行為的。在真實的社會網路中,節點在安全性、電源與網路頻寬等限制下,使得節點必然會有自私行為。
本研究提出利用社交關係為基礎,依據節點間是否成功傳遞封包,來為節點進行評分,並依此評分為節點分級,作為建立朋友清單的資訊。並透過路由找尋時,增加一個友誼標籤來交朋友,並將朋友清單資訊分享給其它節點,使得節點可以利用朋友清單的資訊,以提升網路封包的成功傳遞量。
In a mobile ad hoc network, nodes establish routing paths and usually exchange messages with each other through routing protocols, such as AODV and DSR.
Most MANET routing protocols assume that every node is unselfish. In the real world, people exists selfish behavior because of limited network bandwidth and because battery energy is constrained. This study proposes a social relationship-oriented grading mechanism to grade points of nodes according to previous node behavior in MANET. The mechanism also classifies node levels and shares friend-lists for other neighboring nodes.
This study simulates network performances, such as network throughput, end-to-end delay, and average delivery ratio, to display the effects of friendship on a selfish MANET.
中文摘要 i
Abstract ii
誌謝 iii
Contents iv
List of Figures vi
List of Tables vii
Chapter 1 Introduction 1
Chapter 2 Related Work 2
2.1 Selfish Behavior 2
2.1.1 Not relaying RREQ messages 2
2.1.2 Not sending Hello messages 2
2.1.3 Intentionally delaying the relay of RREQ messages 2
2.1.4 Relays routing messages but not data messages 3
2.2 MANET Routing Protocols 4
2.2.1 Proactive routing or table-driven routing 4
2.2.2 Reactive routing or on-demand routing 4
2.3 DSR Protocol 5
2.3.1 Route Discovery 5
2.3.2 Route Maintenance 6
2.4 Trust Evaluation 7
Chapter 3 The Friendship Strategy 8
3.1 New Friendships 8
3.2 Friend-list Update 9
3.2.1 Static friend relationship 9
3.2.2 Dynamic friendships 10
Chapter 4 Simulation Analysis 12
Simulation 1: The DSRGF protocol affects network throughput for different friend delivery rates 14
Simulation 2: Comparing network throughput for DSRGF stranger delivery rates of 0% 17
Simulation 3: Comparing network throughput for stranger delivery rates of 50% and 0% when the DSRGF friend delivery rate is 95% 20
Simulation 4: DSRGF protocol, when used with different friend/stranger delivery rates, affects end-to-end delay 22
Simulation 5: DSRGF protocol, when used with different friend/stranger delivery rates, affects the packet delivery ratio 24
Simulation 6: The relative packet delivery ratio among various selfish environments and an ideal (unselfish) environment when using a DSR protocol 25
Chapter 5 Conclusion 26
References 27
[1] H. Liu, J. Delgado-Frias, S. Medidi, "Using A Cache Scheme to Detect Selfish Nodes in Mobile Ad Hoc Network," in Proceedings of the Sixth IASTED International Conference Communications, Internet, and Information Technology, July 2-4, 2007.
[2] T. Fahad, R. J. Askwith, "A Node Misbehaviour Detection Mechanism for Mobile Ad-Hoc Networks," The 7th Annual PostGraduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting, 2006.
[3] S. Marti, T. J. Giuli, K. Lai, and M. Baker,"Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," in Proceedings of the 6th annual international Conference on Mobile Computing and Networking, 2000, pp. 255-265.
[4] Joseph P. Macker , M. Scott Corson, "Mobile ad hoc networking and the IETF," ACM SIGMOBILE Mobile Computing and Communications Review, v.2 n.4, October 1998
[5] T. Liu and K. Liu, "Improvements on DSDV in Mobile Ad Hoc Networks," Wireless Communications, Networking and Mobile Computing, pp. 1637-1640, Shanghai, China, 2007.
[6] P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum and L. Viennot," Optimized link state routing protocol for ad hoc networks," in Proceedings of 5th IEEE Multi Topic Conference, pp. 62-68, New York, United States, 2001.
[7] C. E. Perkins, E. M. Belding-Royer and S. R. Das, "Ad hoc On-Demand Distance Vector Routing," in Proceedings of the Second IEEE Workshop Mobile Computing Systems and Applications, pp. 90-100, New Orleans, Los Angles, 1999.
[8] D. B. Johnson and D. A. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks," In Mobile Computing, edited by Tomasz Imielinski and Hank Korth, Chapter 5, Kluwer Academic Publishers, pp. 153-181, 1996. 
[9] S. Yokoyama, Y. Nakane, O. Takahashi, and E. Miyamoto, "Evaluation of the Impact of Selfish Nodes in Ad Hoc Networks and Detection and Countermeasure Methods," Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006).
[10] Frank Kargl, Andreas Klenk, Stefan Schlott, Michael Weber, "Advanced Detection of Selfish or malicious Nodes in Ad hoc Networks," University of UIm, Dep. Of Multimedia Computing, UIm, Germany.
[11] "QualNet Developer | network modeling & simulation software | Scalable Network Technologies", http://www.scalable-networks.com/products/qualnet/, Scalable Networks Technologies, Inc.
[12] "QualNet 5.0 Programmer’s Guide", http://www.scalable-networks.com, Scalable Network Technologies, Inc.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *