Author: |
蘇威豪 Wei-hao Su |
---|---|
Thesis Title: |
以社交關係為基礎的隨意網路之效能研究 A Network Performance Study for Social Relationship-oriented MANET |
Advisor: |
羅乃維
Nai-wei Lo |
Committee: |
左瑞麟
Ray-lin Tso 呂永和 Yung-ho Leu |
Degree: |
碩士 Master |
Department: |
管理學院 - 資訊管理系 Department of Information Management |
Thesis Publication Year: | 2012 |
Graduation Academic Year: | 100 |
Language: | 英文 |
Pages: | 28 |
Keywords (in Chinese): | 友誼機制 、隨意網路 、社交關係 、自私節點 、社交關係導向之分級機制 、封包傳遞率 |
Keywords (in other languages): | Social relationship-oriented grading mechanism |
Reference times: | Clicks: 546 Downloads: 2 |
Share: |
School Collection Retrieve National Library Collection Retrieve Error Report |
在隨意網路中,節點間交換訊息通常是透過路由協定如AODV、DSR來為節點建立連線,以往路由協定大多是假設節點間訊息的交換是沒有自私行為的。在真實的社會網路中,節點在安全性、電源與網路頻寬等限制下,使得節點必然會有自私行為。
本研究提出利用社交關係為基礎,依據節點間是否成功傳遞封包,來為節點進行評分,並依此評分為節點分級,作為建立朋友清單的資訊。並透過路由找尋時,增加一個友誼標籤來交朋友,並將朋友清單資訊分享給其它節點,使得節點可以利用朋友清單的資訊,以提升網路封包的成功傳遞量。
In a mobile ad hoc network, nodes establish routing paths and usually exchange messages with each other through routing protocols, such as AODV and DSR.
Most MANET routing protocols assume that every node is unselfish. In the real world, people exists selfish behavior because of limited network bandwidth and because battery energy is constrained. This study proposes a social relationship-oriented grading mechanism to grade points of nodes according to previous node behavior in MANET. The mechanism also classifies node levels and shares friend-lists for other neighboring nodes.
This study simulates network performances, such as network throughput, end-to-end delay, and average delivery ratio, to display the effects of friendship on a selfish MANET.
[1] H. Liu, J. Delgado-Frias, S. Medidi, "Using A Cache Scheme to Detect Selfish Nodes in Mobile Ad Hoc Network," in Proceedings of the Sixth IASTED International Conference Communications, Internet, and Information Technology, July 2-4, 2007.
[2] T. Fahad, R. J. Askwith, "A Node Misbehaviour Detection Mechanism for Mobile Ad-Hoc Networks," The 7th Annual PostGraduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting, 2006.
[3] S. Marti, T. J. Giuli, K. Lai, and M. Baker,"Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," in Proceedings of the 6th annual international Conference on Mobile Computing and Networking, 2000, pp. 255-265.
[4] Joseph P. Macker , M. Scott Corson, "Mobile ad hoc networking and the IETF," ACM SIGMOBILE Mobile Computing and Communications Review, v.2 n.4, October 1998
[5] T. Liu and K. Liu, "Improvements on DSDV in Mobile Ad Hoc Networks," Wireless Communications, Networking and Mobile Computing, pp. 1637-1640, Shanghai, China, 2007.
[6] P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum and L. Viennot," Optimized link state routing protocol for ad hoc networks," in Proceedings of 5th IEEE Multi Topic Conference, pp. 62-68, New York, United States, 2001.
[7] C. E. Perkins, E. M. Belding-Royer and S. R. Das, "Ad hoc On-Demand Distance Vector Routing," in Proceedings of the Second IEEE Workshop Mobile Computing Systems and Applications, pp. 90-100, New Orleans, Los Angles, 1999.
[8] D. B. Johnson and D. A. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks," In Mobile Computing, edited by Tomasz Imielinski and Hank Korth, Chapter 5, Kluwer Academic Publishers, pp. 153-181, 1996.
[9] S. Yokoyama, Y. Nakane, O. Takahashi, and E. Miyamoto, "Evaluation of the Impact of Selfish Nodes in Ad Hoc Networks and Detection and Countermeasure Methods," Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006).
[10] Frank Kargl, Andreas Klenk, Stefan Schlott, Michael Weber, "Advanced Detection of Selfish or malicious Nodes in Ad hoc Networks," University of UIm, Dep. Of Multimedia Computing, UIm, Germany.
[11] "QualNet Developer | network modeling & simulation software | Scalable Network Technologies", http://www.scalable-networks.com/products/qualnet/, Scalable Networks Technologies, Inc.
[12] "QualNet 5.0 Programmer’s Guide", http://www.scalable-networks.com, Scalable Network Technologies, Inc.