Please use this identifier to cite or link to this item: https://ah.nccu.edu.tw/handle/140.119/119800


Title: 利用間歇連線P2P訊息擴散機制的WaterChat APP設計
A WaterChat APP Based on intermittent-connected P2P Message flooding Mechanism
Authors: 羅尉晉
LUO, WEI-JIN
Contributors: 蔡子傑
Tsai, Tzu-Chieh
羅尉晉
LUO, WEI-JIN
Keywords: 間歇連結移動網路
行動隨機網路
Intermittently connected networks
Opportunistic mobile network
Date: 2018
Issue Date: 2018-08-29 16:04:18 (UTC+8)
Abstract: 近年來隨著行動裝置及行動網路的普及,使得社群網路及各種社交聊天應用已融入使用者生活之中,但在許多場合如集會遊行、陳情抗議、大型室內外活動,因人潮聚集,使得行動無線網路訊號壅塞,致訊息無法正常傳遞。而隨著WiFi Direct及Bluetooth 4.0等無線技術的普及,行動裝置間的連線有了更多的選擇。
本論文研究中,參考WaterChat的概念,重新設計一個可彈性適用於四種聊天情境地系統架構,搭配兩種私人聊天室的邀請模式,利用控制閥值以及監測節點連線及同步,減少Flooding造成的效率低落。
實作一個基於隨機性社交網路且適用多聊天情境的社交聊天應用並加入了異地同步的機制,使得訊息傳遞範圍不再囿限於現實的地理限制,並在最後探討訊息加密的可能,提出並實作一新穎且功能完備的多群組行動聊天情境應用。
With the popularization of mobile devices and mobile networks, social networks and various social chat applications have played an important role in users’ daily life. However, in several large-scale events like protests or indoor/outdoor activities with large amount of people, due to mobile wireless network signal congestion, messages cannot be transmitted normally. Nowadays, new wireless technologies such as Wi-Fi Direct and Bluetooth 4.0 has provided more connection choices between mobile devices.
First, we redesigned a system architecture based on the concept of WaterChat which is flexible and suitable for four different chat scenarios. Users can choose one of two invitation modes depending on their privacy requirements. Secondly, to solve flooding in opportunistic mobile network, we present threshold and connection control to improve the efficiency in our system. We also present an off-site synchronization, so the message transmission scope is no longer limited to the physical geographical restrictions. In the end, we will some discuss security issue and how to encrypt messages in four chat scenarios.
To sum up, we design and implement a novel and full-featured WaterChat App based on intermittent-connected P2P Message flooding Mechanism.
Reference: [1] FireChat, Retrieved January, 15, 2017 from http://opengarden.com/firechat/
[2] Apple iOS MultipeerConnectivity Framework, Retrieved January, 15, 2017 https://developer.apple.com/documentation/multipeerconnectivity/
[3] Misra, S., Saha, B. K., & Pal, S. (2016). Opportunistic mobile networks.
[4] Pelusi, L., Passarella, A., & Conti, M. (2006). Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE communications Magazine, 44(11).
[5] Gao, W., & Li, Q. (2013, April). Wakeup scheduling for energy-efficient communication in opportunistic mobile networks. In INFOCOM, 2013 Proceedings IEEE (pp. 2058-2066). IEEE.
[6] Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance vector (AODV) routing (No. RFC 3561).
[7] Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. Mobile computing, 153-181.
[8] Trifunovic, S., Distl, B., Schatzmann, D., & Legendre, F. (2011, September). WiFi-Opp: ad-hoc-less opportunistic networking. In Proceedings of the 6th ACM workshop on Challenged networks (pp. 37-42). ACM.
[9] Vu, L., Nahrstedt, K., Retika, S., & Gupta, I. (2010, October). Joint bluetooth/wifi scanning framework for characterizing and leveraging people movement in university campus. In Proceedings of the 13th ACM international conference on Modeling, analysis, and simulation of wireless and mobile systems (pp. 257-265). ACM.
[10] Funai, C., Tapparello, C., & Heinzelman, W. (2016, December). Mobile to Mobile Computational Offloading in Multi-hop Cooperative Networks. In Global Communications Conference (GLOBECOM), 2016 IEEE (pp. 1-7). IEEE.
[11] Funai, C., Tapparello, C., & Heinzelman, W. (2015). Supporting multi-hop device-to-device networks through WiFi direct multi-group networking. arXiv preprint arXiv:1601.00028.
[12] Mao, Z., Jiang, Y., Min, G., Leng, S., Jin, X., & Yang, K. (2017). Mobile social networks: Design requirements, architecture, and state-of-the-art technology. Computer Communications, 100, 1-19.
[13] Ott, J., & Pitkanen, M. J. (2007, June). Dtn-based content storage and retrieval. In World of Wireless, Mobile and Multimedia Networks, 2007. WoWMoM 2007. IEEE International Symposium on a (pp. 1-7). IEEE.
[14] Liu, H. Q., Zhao, S. W., & Shang, J. (2014). Research on Delay-Tolerant Network and Increasing Probability of Opportunistic Communication. In Applied Mechanics and Materials (Vol. 496, pp. 2095-2098). Trans Tech Publications.
[15] Conti, M., Delmastro, F., Minutiello, G., & Paris, R. (2013, November). Experimenting opportunistic networks with WiFi Direct. In Wireless Days (WD), 2013 IFIP (pp. 1-6). IEEE.
[16] Keränen, A., Ott, J., & Kärkkäinen, T. (2009, March). The ONE simulator for DTN protocol evaluation. In Proceedings of the 2nd international conference on simulation tools and techniques (p. 55). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).
[17] Moreira, W., Ferreira, R., Cirqueira, D., Mendes, P., & Cerqueira, E. (2013, September). SocialDTN: a DTN implementation for digital and social inclusion. In Proceedings of the 2013 ACM MobiCom workshop on Lowest cost denominator networking for universal access (pp. 25-28). ACM.
[18] Tsai, T. C., Liu, T. S., & Han, C. C. (2017). WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks. Journal of Communications, 12(7).
[19] Tsai, T. C., Chan, H. H., Han, C. C., & Chen, P. C. (2016, November). A Social Behavior Based Interest-Message Dissemination Approach in Delay Tolerant Networks. In International Conference on Future Network Systems and Security (pp. 62-80). Springer International Publishing.
[20] Tsai, T. C., Han, C. C., & Yen, S. Y. (2016, November). Collaborative Network Coding in Opportunistic Mobile Social Network. In International Conference on Future Network Systems and Security (pp. 187-194). Springer International Publishing.
[21] Tsai, T. C., & Chan, H. H. (2015). NCCU Trace: Social-network-aware mobility trace. IEEE Communications Magazine, 53(10), 144-149.
[22] Chen, Y., Liu, X., Liu, J., Taylor, W., & Moore, J. H. (2015). Delay-tolerant networks and network coding: Comparative studies on simulated and real-device experiments. Computer Networks, 83, 349-362.
[23] Xiao, M., Wu, J., & Huang, L. (2014). Community-aware opportunistic routing in mobile social networks. IEEE Transactions on Computers, 63(7), 1682-1695.
[24] Kwon, T. J., & Gerla, M. (2002). Efficient flooding with passive clustering (PC) in ad hoc networks. ACM SIGCOMM Computer Communication Review, 32(1), 44-56.
[25] Sasson, Y., Cavin, D., & Schiper, A. (2003, March). Probabilistic broadcast for flooding in wireless mobile ad hoc networks. In Wireless Communications and Networking, 2003. WCNC 2003. 2003 IEEE (Vol. 2, pp. 1124-1130). IEEE.
[26] Shukla, S., Munjal, A., & Singh, Y. N. (2015). Routing protocol Approaches in Delay Tolerant Networks. In International Conference on Educational and Information Technology MCNC(pp. 91-95).
[27] Baker, C. E., Starke, A., Xing, S., & McNair, J. (2017, May). Demo abstract: A research platform for real-world evaluation of routing schemes in delay tolerant social networks. In Computer Communications Workshops (INFOCOM WKSHPS), 2017 IEEE Conference on (pp. 978-979). IEEE.
[28] Zhai, Y., Bai, X., & Liu, Q. (2017, July). Incentive mechanisms in mobile delay tolerant network. In Electronics Information and Emergency Communication (ICEIEC), 2017 7th IEEE International Conference on (pp. 184-188). IEEE.
[29] Wang, X., Zhang, Y., Leung, V. C., Guizani, N., & Jiang, T. (2018). D2D Big Data: Content Deliveries over Wireless Device-to-Device Sharing in Large-Scale Mobile Networks. IEEE Wireless Communications, 25(1), 32-38.
[30] Qin, X., Xie, G., & Gao, J. (2017, July). A dynamic topological potential and social relationship based routing protocol for mobile social delay tolerant networks. In Computer, Information and Telecommunication Systems (CITS), 2017 International Conference on (pp. 98-102). IEEE.
[31] Mao, Z., Jiang, Y., Min, G., Leng, S., Jin, X., & Yang, K. (2017). Mobile social networks: Design requirements, architecture, and state-of-the-art technology. Computer Communications, 100, 1-19.
[32] Zhang, Y., Song, L., Jiang, C., Tran, N. H., Dawy, Z., & Han, Z. (2017). A social-aware framework for efficient information dissemination in wireless ad hoc networks. IEEE Communications Magazine, 55(1), 174-179.
[33] Trifunovic, S., Kouyoumdjieva, S. T., Distl, B., Pajevic, L., Karlsson, G., & Plattner, B. (2017). A decade of research in opportunistic networks: challenges, relevance, and future directions. IEEE Communications Magazine, 55(1), 168-173.
[34] Liu, X., Li, Z., Yang, P., & Dong, Y. (2017). Information-centric mobile ad hoc networks and content routing: a survey. Ad Hoc Networks, 58, 255-268.
[35] Zhou, H., Leung, V. C., Zhu, C., Xu, S., & Fan, J. (2017). Predicting temporal social contact patterns for data forwarding in opportunistic mobile networks. IEEE Transactions on Vehicular Technology, 66(11), 10372-10383.
[36] Liu, Y., Wu, H., Xia, Y., Wang, Y., Li, F., & Yang, P. (2017). Optimal online data dissemination for resource constrained mobile opportunistic networks. IEEE Transactions on Vehicular Technology, 66(6), 5301-5315.
[37] Li, F., Jiang, H., Li, H., Cheng, Y., & Wang, Y. (2017). SEBAR: social-energy-based routing for mobile social delay-tolerant networks. IEEE Transactions on Vehicular Technology, 66(8), 7195-7206.
[38] Liu, Y., Wang, K., Guo, H., Lu, Q., & Sun, Y. (2017). Social-aware computing based congestion control in delay tolerant networks. Mobile Networks and Applications, 22(2), 174-185.
[39] Jedari, B., Liu, L., Qiu, T., Rahim, A., & Xia, F. (2017). A game-theoretic incentive scheme for social-aware routing in selfish mobile social networks. Future Generation Computer Systems, 70, 178-190.
[40] Daly, E. M., & Haahr, M. (2007, September). Social network analysis for routing in disconnected delay-tolerant manets. In Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing (pp. 32-40). ACM.
[41] Gao, W., Li, Q., Zhao, B., & Cao, G. (2009, May). Multicasting in delay tolerant networks: a social network perspective. In Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing (pp. 299-308). ACM.
Description: 碩士
國立政治大學
資訊科學系碩士在職專班
102971005
Source URI: http://thesis.lib.nccu.edu.tw/record/#G0102971005
Data Type: thesis
Appears in Collections:[資訊科學系碩士在職專班] 學位論文

Files in This Item:

File SizeFormat
100501.pdf1134KbAdobe PDF0View/Open


All items in 學術集成 are protected by copyright, with all rights reserved.


社群 sharing