研究生: |
蘇威豪 Wei-hao Su |
---|---|
論文名稱: |
以社交關係為基礎的隨意網路之效能研究 A Network Performance Study for Social Relationship-oriented MANET |
指導教授: |
羅乃維
Nai-wei Lo |
口試委員: |
左瑞麟
Ray-lin Tso 呂永和 Yung-ho Leu |
學位類別: |
碩士 Master |
系所名稱: |
管理學院 - 資訊管理系 Department of Information Management |
論文出版年: | 2012 |
畢業學年度: | 100 |
語文別: | 英文 |
論文頁數: | 28 |
中文關鍵詞: | 友誼機制 、隨意網路 、社交關係 、自私節點 、社交關係導向之分級機制 、封包傳遞率 |
外文關鍵詞: | Social relationship-oriented grading mechanism |
相關次數: | 點閱:486 下載:2 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
在隨意網路中,節點間交換訊息通常是透過路由協定如AODV、DSR來為節點建立連線,以往路由協定大多是假設節點間訊息的交換是沒有自私行為的。在真實的社會網路中,節點在安全性、電源與網路頻寬等限制下,使得節點必然會有自私行為。
本研究提出利用社交關係為基礎,依據節點間是否成功傳遞封包,來為節點進行評分,並依此評分為節點分級,作為建立朋友清單的資訊。並透過路由找尋時,增加一個友誼標籤來交朋友,並將朋友清單資訊分享給其它節點,使得節點可以利用朋友清單的資訊,以提升網路封包的成功傳遞量。
In a mobile ad hoc network, nodes establish routing paths and usually exchange messages with each other through routing protocols, such as AODV and DSR.
Most MANET routing protocols assume that every node is unselfish. In the real world, people exists selfish behavior because of limited network bandwidth and because battery energy is constrained. This study proposes a social relationship-oriented grading mechanism to grade points of nodes according to previous node behavior in MANET. The mechanism also classifies node levels and shares friend-lists for other neighboring nodes.
This study simulates network performances, such as network throughput, end-to-end delay, and average delivery ratio, to display the effects of friendship on a selfish MANET.
[1] H. Liu, J. Delgado-Frias, S. Medidi, "Using A Cache Scheme to Detect Selfish Nodes in Mobile Ad Hoc Network," in Proceedings of the Sixth IASTED International Conference Communications, Internet, and Information Technology, July 2-4, 2007.
[2] T. Fahad, R. J. Askwith, "A Node Misbehaviour Detection Mechanism for Mobile Ad-Hoc Networks," The 7th Annual PostGraduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting, 2006.
[3] S. Marti, T. J. Giuli, K. Lai, and M. Baker,"Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," in Proceedings of the 6th annual international Conference on Mobile Computing and Networking, 2000, pp. 255-265.
[4] Joseph P. Macker , M. Scott Corson, "Mobile ad hoc networking and the IETF," ACM SIGMOBILE Mobile Computing and Communications Review, v.2 n.4, October 1998
[5] T. Liu and K. Liu, "Improvements on DSDV in Mobile Ad Hoc Networks," Wireless Communications, Networking and Mobile Computing, pp. 1637-1640, Shanghai, China, 2007.
[6] P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum and L. Viennot," Optimized link state routing protocol for ad hoc networks," in Proceedings of 5th IEEE Multi Topic Conference, pp. 62-68, New York, United States, 2001.
[7] C. E. Perkins, E. M. Belding-Royer and S. R. Das, "Ad hoc On-Demand Distance Vector Routing," in Proceedings of the Second IEEE Workshop Mobile Computing Systems and Applications, pp. 90-100, New Orleans, Los Angles, 1999.
[8] D. B. Johnson and D. A. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks," In Mobile Computing, edited by Tomasz Imielinski and Hank Korth, Chapter 5, Kluwer Academic Publishers, pp. 153-181, 1996.
[9] S. Yokoyama, Y. Nakane, O. Takahashi, and E. Miyamoto, "Evaluation of the Impact of Selfish Nodes in Ad Hoc Networks and Detection and Countermeasure Methods," Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006).
[10] Frank Kargl, Andreas Klenk, Stefan Schlott, Michael Weber, "Advanced Detection of Selfish or malicious Nodes in Ad hoc Networks," University of UIm, Dep. Of Multimedia Computing, UIm, Germany.
[11] "QualNet Developer | network modeling & simulation software | Scalable Network Technologies", http://www.scalable-networks.com/products/qualnet/, Scalable Networks Technologies, Inc.
[12] "QualNet 5.0 Programmer’s Guide", http://www.scalable-networks.com, Scalable Network Technologies, Inc.