學術產出-學位論文
文章檢視/開啟
書目匯出
-
題名 考慮時間價值的兩階段群組訊息網路編碼的散播機制
A two-phase network coding design for mobile time-valued group-message dissemination作者 劉亭侁
Liu, Ting Shen貢獻者 蔡子傑
Tsai, Tzu Chieh
劉亭侁
Liu, Ting Shen關鍵詞 聊天應用程式
間歇性連接網路
廣播傳輸
網絡編碼
政大軌跡紀錄
機會性社群網路
Chat App
Intermittently Connected Networks
Broadcast
Network Coding
NCCU Trace Data
Opportunistic Mobile Social Network日期 2017 上傳時間 8-二月-2017 16:42:03 (UTC+8) 摘要 現今因無線通訊技術的進步,使得人們能方便地利用智慧型裝置透過3G,4G和Wi-Fi等技術彼此溝通聊天。其中,聊天應用是最受智慧型裝置使用者歡迎的應用程式。大部分的聊天應用程式需依賴網路以達到訊息交換的目的。然而網路的頻寬是非常有限的,當使用者處在擁擠的環境中時,他們可能會面臨資源耗盡問題。此外,例如在漫遊的情況下有些使用者並沒有行動網路的存取,導致使用者無法使用聊天應用。 因此我們希望利用無線廣播傳輸的特性,開發一個應用於間歇性網路連接的聊天應用程式。然而,廣播傳輸的散播策略若沒有設計得宜,可能導致廣播風暴的問題,使得整體網路效能低落。我們研究的目標是要如何在間歇性網路增加訊息的傳輸效率。為了達成此目標,在我們的研究中考量了許多技術要求,如:訊息具有截止時間與優先權特性、多聊天室應用、傳輸效率。 我們提出了一種兩階段基於網絡編碼設計的訊息散播方法,實現在機會性社群網路中的訊息散播。網絡編碼階段,提高網路頻寬的傳輸效率,也能增加網路傳輸的可靠性;預熱階段能提升網路編碼訊息被解開的機率。最後,利用政大的真實軌跡紀錄評估我們所設計的訊息傳播方法。結果顯示,我們的方法是有效率且優於氾濫式的路由協議和一般的網絡編碼散播技術。
Nowadays, the advancement of wireless communication technology has allowed people to use smart phones to communicate with each other more easily via 3G/4G, Wi-Fi, etc. One kind of popular mobile Apps is “chat” App. Most chat Apps rely on the Internet to exchange the messages. However, the bandwidth of network is limited in some circumstances. When users stay in the crowded environment, they will face the resource depletion problem. Besides, some people may not subscribe to any cellular network access, e.g. in roaming scenarios. Therefore, we want to develop a novel mobile Chat APP in intermittently connected networks. We utilize the characteristic of the wireless broadcast transmission. However, it may cause the broadcast storm problem without careful design. How to increase the efficiency of message delivery in such intermittently connected networks is our research goal. To achieve this, technical issues in our research involve message priority, multi-chatroom, deadline and transmission efficiency. We proposed a two-phase network coding design for message dissemination to enable the multi-hop instant messaging in Opportunistic Mobile Social Networks. The network coding phase can increase the bandwidth utility and transmission efficiency. Moreover, it can improve transmission robustness and adaptability. The warm up phase can increase the decoding probability of coded packets. Finally, we evaluated our approach with real trace data from NCCU. The results showed that our approach is effective and superior to the flooding based routing protocol and the pure network coding technique.參考文獻 [1] FireChat: https://opengarden.com/firechat[2] Yu-Chee Tseng , Sze-Yao Ni , Yuh-Shyan Chen , Jang-Ping Sheu, The broadcast storm problem in a mobile ad hoc network, Wireless Networks, v.8 n.2/3, p.153-167, March-May 2002[3] R. Ahlswede, N. Cai, S.-Y. R. Li and R. W. Yeung, "Network information flow," IEEE Trans. On Information Theory, vol. 46, pp. 1204-1216, 2000.[4] K. Fall, “A delay-tolerant network architecture for challenged internets.” in Proc. SIGCOMM, 2003.[5] Jian Shen, Sangman Moh, and Ilyong Chung, “Routing Protocols in Delay Tolerant Networks: A Comparative Survey” in International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC’ 08), July 2008[6] T. Ho, R. Koetter, M. Medard, D. R. Karger, and M.Effros. “The benefits of coding over routing in a randomized setting”International Symposium on Information Theory (ISIT), page 442, July 2003[7] R. H. Frenkiel, B. R. Badrinath, J. Borres, and R. D. Yates, “The infostations challenge: balancing cost and ubiquity in delivering wireless data,” IEEE Personal Communications, vol. 7, no. 2, pp. 66–71, 2000[8] A. Demers, D. Greene, C. Houser, W. Irish, J. Larson, S. Shenker, H. Sturgis, D. Swinehart, and D. Terry,“Epidemic algorithms for replicated database maintenance,” SIGOPS Operating Systems Review, vol. 22, pp. 8–32, January 1988.[9] TSAI, Tzu-Chieh; CHAN, Ho-Hsiang. NCCU Trace: social-network-aware mobility trace. IEEE Communications Magazine, 2015, 53.10: 144-149.[10] N. Eagle and A. Pentland. Reality mining: sensing complex social systems. Personal and Ubiquitous Computing, Vol 10(4):255–268, May 2006.[11] P. Hui, People are the network: experimental design and evaluation of social-based forwarding algorithms, Ph.D. dissertation, UCAM-CL-TR-713. University of Cambridge, Comp.Lab., 2008[12] V. Srinivasan, M. Motani, and W. T. Ooi, “Analysis and implications of student contact patterns derived from campus schedules,” in Proc.ACM MobiCom, Los Angeles,CA, Sep.2006,pp.86–97.[13] CHEN, Yuanzhu, et al. Delay-tolerant networks and network coding: Comparative studies on simulated and real device experiments. Computer Networks, 2015, 83: 349-362.[14] OSTOVARI, Pouya; KHREISHAH, Abdallah; WU, Jie. Broadcasting with hard deadlines in wireless multihop networks using network coding. Wireless Communications and Mobile Computing, 2015, 15.5: 983-999.[15] Ostovari, Pouya, Jie Wu, and Abdallah Khreishah. "Deadline-aware broadcasting in wireless networks with local network coding." Computing, Networking and Communications (ICNC), 2012 International Conference on. IEEE, 2012.[16] Spyropoulos, Thrasyvoulos, Konstantinos Psounis, and Cauligi S. Raghavendra. "Spray and wait: an efficient routing scheme for intermittently connected mobile networks." Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking. ACM, 2005.[17] Xiao, Mingjun, Jie Wu, and Liusheng Huang. "Community-aware opportunistic routing in mobile social networks." IEEE Transactions on Computers 63.7 (2014): 1682-1695.[18] Jorg Widmer, Jean-Yves Le Boudec, Network coding for efficient communication in extreme networks, in: Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking, 2005, pp. 284–291.[19] A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott, “Impact of human mobility on the design of opportunistic forwarding algorithms,” in Proc. INFOCOM, April 2006.[20] T. Karagiannis, J.-Y. Le Boudec, and M. Vojnovic, “Power law and exponential decay of inter contact times between mobile ´ devices,” in ACM MobiCom ’07, 2007.[21] J. Leguay, A. Lindgren, J. Scott, T. Friedman, and J. Crowcroft, “Opportunistic content distribution in an urban setting,” in ACM CHANTS, 2006, pp. 205–212.[22] Socievole, Annalisa, Floriano De Rango, and Antonio Caputo. "Wireless contacts, Facebook friendships and interests: Analysis of a multi-layer social network in an academic environment." 2014 IFIP Wireless Days (WD). IEEE, 2014.[23] https://github.com/NCCU-MCLAB/NCCU-Trace-Data[24] L. Li, R. Ramjee, M. Buddhikot, and S. Miller, “Network coding-based broadcast in mobile ad-hoc networks,” in IEEE INFOCOM, May 2007.[25] http://www.investopedia.com/terms/t/timevalue.asp[26] 郭振茂, "淺談選擇權評價Black-Scholes 公式中希臘字母的應用", 2003[27] https://en.wikipedia.org/wiki/Greeks_(finance)[28] A. Ker¨anen, J. Ott, and T. K¨arkk¨ainen. The ONE Simulator for DTN Protocol Evaluation. In Proceedings of the 2nd International Conference on Simulation Tools and Techniques, March 2009.[29] Marin, Radu-Corneliu, Ciprian Dobre, and Fatos Xhafa. "Exploring Predictability in Mobile Interaction." EIDWT. 2012. 描述 碩士
國立政治大學
資訊科學學系
103753010資料來源 http://thesis.lib.nccu.edu.tw/record/#G0103753010 資料類型 thesis dc.contributor.advisor 蔡子傑 zh_TW dc.contributor.advisor Tsai, Tzu Chieh en_US dc.contributor.author (作者) 劉亭侁 zh_TW dc.contributor.author (作者) Liu, Ting Shen en_US dc.creator (作者) 劉亭侁 zh_TW dc.creator (作者) Liu, Ting Shen en_US dc.date (日期) 2017 en_US dc.date.accessioned 8-二月-2017 16:42:03 (UTC+8) - dc.date.available 8-二月-2017 16:42:03 (UTC+8) - dc.date.issued (上傳時間) 8-二月-2017 16:42:03 (UTC+8) - dc.identifier (其他 識別碼) G0103753010 en_US dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/106436 - dc.description (描述) 碩士 zh_TW dc.description (描述) 國立政治大學 zh_TW dc.description (描述) 資訊科學學系 zh_TW dc.description (描述) 103753010 zh_TW dc.description.abstract (摘要) 現今因無線通訊技術的進步,使得人們能方便地利用智慧型裝置透過3G,4G和Wi-Fi等技術彼此溝通聊天。其中,聊天應用是最受智慧型裝置使用者歡迎的應用程式。大部分的聊天應用程式需依賴網路以達到訊息交換的目的。然而網路的頻寬是非常有限的,當使用者處在擁擠的環境中時,他們可能會面臨資源耗盡問題。此外,例如在漫遊的情況下有些使用者並沒有行動網路的存取,導致使用者無法使用聊天應用。 因此我們希望利用無線廣播傳輸的特性,開發一個應用於間歇性網路連接的聊天應用程式。然而,廣播傳輸的散播策略若沒有設計得宜,可能導致廣播風暴的問題,使得整體網路效能低落。我們研究的目標是要如何在間歇性網路增加訊息的傳輸效率。為了達成此目標,在我們的研究中考量了許多技術要求,如:訊息具有截止時間與優先權特性、多聊天室應用、傳輸效率。 我們提出了一種兩階段基於網絡編碼設計的訊息散播方法,實現在機會性社群網路中的訊息散播。網絡編碼階段,提高網路頻寬的傳輸效率,也能增加網路傳輸的可靠性;預熱階段能提升網路編碼訊息被解開的機率。最後,利用政大的真實軌跡紀錄評估我們所設計的訊息傳播方法。結果顯示,我們的方法是有效率且優於氾濫式的路由協議和一般的網絡編碼散播技術。 zh_TW dc.description.abstract (摘要) Nowadays, the advancement of wireless communication technology has allowed people to use smart phones to communicate with each other more easily via 3G/4G, Wi-Fi, etc. One kind of popular mobile Apps is “chat” App. Most chat Apps rely on the Internet to exchange the messages. However, the bandwidth of network is limited in some circumstances. When users stay in the crowded environment, they will face the resource depletion problem. Besides, some people may not subscribe to any cellular network access, e.g. in roaming scenarios. Therefore, we want to develop a novel mobile Chat APP in intermittently connected networks. We utilize the characteristic of the wireless broadcast transmission. However, it may cause the broadcast storm problem without careful design. How to increase the efficiency of message delivery in such intermittently connected networks is our research goal. To achieve this, technical issues in our research involve message priority, multi-chatroom, deadline and transmission efficiency. We proposed a two-phase network coding design for message dissemination to enable the multi-hop instant messaging in Opportunistic Mobile Social Networks. The network coding phase can increase the bandwidth utility and transmission efficiency. Moreover, it can improve transmission robustness and adaptability. The warm up phase can increase the decoding probability of coded packets. Finally, we evaluated our approach with real trace data from NCCU. The results showed that our approach is effective and superior to the flooding based routing protocol and the pure network coding technique. en_US dc.description.tableofcontents CHAPTER 1 Introduction 11.1 Background & Motivation 11.2 Goal 21.3 Opportunistic Mobile Social Network 31.4 Network Coding 4CHAPTER 2 Related work 62.1 Social Trace Data 62.1.1 Reality Mining: MIT 62.1.2 Cambridge 72.1.3 INFOCOM 82.1.4 UPB Trace 82.1.5 NCCU 92.2 Flooding-based routing protocol 92.2.1 Direct Delivery Routing Protocol 92.2.2 Epidemic Routing protocol 102.2.3 Spray and wait routing protocol 102.3 Network coding technique in the network 112.3.1 Delay-tolerant networks and network coding 112.3.2 Broadcasting with hard deadlines in wireless multi-hop networks 112.3.3 Deadline-aware Broadcasting in Wireless Networks 12CHAPTER 3 NCCU Trace Data 133.1 The composition of trace data 143.1.1 Participant 143.1.2 Interest Relation 143.1.3 Trace Data 15CHAPTER 4 A Two-Phase Network Coding Design for Mobile Time-valued Group-message Dissemination 164.1 Environment Definition 164.2 Time Value 184.3 Warm Up phase 224.4 Network Coding Phase 224.5 2-Phase: Dynamic Threshold 234.6 Activity Ratio (AR) 254.7 Meta-data 264.8 Buffer management 284.9 Routing Strategy 294.9.1 Exchange Meta-data 294.9.2 Generate Message Candidate Set (CS) 304.9.3 Message Forwarding Sequence 334.9.4 Update Meta-data 36Chapter 5 Simulation setting 375.1 Simulation environment 375.2 Simulation Setting 385.3 Simulation results 405.3.1 Delivery ratio 415.3.2 Delay time 425.3.3 Time value 435.3.4 Overhead ratio 445.4 Insight Analysis 455.4.1 Delivery Ratio 455.4.2 Dynamic 2-phase Optimization 475.4.3 Other method 49Chapter 6 Conclusion and Future Work 50Reference 51 zh_TW dc.format.extent 2089558 bytes - dc.format.extent 2089558 bytes - dc.format.mimetype application/pdf - dc.format.mimetype application/pdf - dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0103753010 en_US dc.subject (關鍵詞) 聊天應用程式 zh_TW dc.subject (關鍵詞) 間歇性連接網路 zh_TW dc.subject (關鍵詞) 廣播傳輸 zh_TW dc.subject (關鍵詞) 網絡編碼 zh_TW dc.subject (關鍵詞) 政大軌跡紀錄 zh_TW dc.subject (關鍵詞) 機會性社群網路 zh_TW dc.subject (關鍵詞) Chat App en_US dc.subject (關鍵詞) Intermittently Connected Networks en_US dc.subject (關鍵詞) Broadcast en_US dc.subject (關鍵詞) Network Coding en_US dc.subject (關鍵詞) NCCU Trace Data en_US dc.subject (關鍵詞) Opportunistic Mobile Social Network en_US dc.title (題名) 考慮時間價值的兩階段群組訊息網路編碼的散播機制 zh_TW dc.title (題名) A two-phase network coding design for mobile time-valued group-message dissemination en_US dc.type (資料類型) thesis en_US dc.relation.reference (參考文獻) [1] FireChat: https://opengarden.com/firechat[2] Yu-Chee Tseng , Sze-Yao Ni , Yuh-Shyan Chen , Jang-Ping Sheu, The broadcast storm problem in a mobile ad hoc network, Wireless Networks, v.8 n.2/3, p.153-167, March-May 2002[3] R. Ahlswede, N. Cai, S.-Y. R. Li and R. W. Yeung, "Network information flow," IEEE Trans. On Information Theory, vol. 46, pp. 1204-1216, 2000.[4] K. Fall, “A delay-tolerant network architecture for challenged internets.” in Proc. SIGCOMM, 2003.[5] Jian Shen, Sangman Moh, and Ilyong Chung, “Routing Protocols in Delay Tolerant Networks: A Comparative Survey” in International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC’ 08), July 2008[6] T. Ho, R. Koetter, M. Medard, D. R. Karger, and M.Effros. “The benefits of coding over routing in a randomized setting”International Symposium on Information Theory (ISIT), page 442, July 2003[7] R. H. Frenkiel, B. R. Badrinath, J. Borres, and R. D. Yates, “The infostations challenge: balancing cost and ubiquity in delivering wireless data,” IEEE Personal Communications, vol. 7, no. 2, pp. 66–71, 2000[8] A. Demers, D. Greene, C. Houser, W. Irish, J. Larson, S. Shenker, H. Sturgis, D. Swinehart, and D. Terry,“Epidemic algorithms for replicated database maintenance,” SIGOPS Operating Systems Review, vol. 22, pp. 8–32, January 1988.[9] TSAI, Tzu-Chieh; CHAN, Ho-Hsiang. NCCU Trace: social-network-aware mobility trace. IEEE Communications Magazine, 2015, 53.10: 144-149.[10] N. Eagle and A. Pentland. Reality mining: sensing complex social systems. Personal and Ubiquitous Computing, Vol 10(4):255–268, May 2006.[11] P. Hui, People are the network: experimental design and evaluation of social-based forwarding algorithms, Ph.D. dissertation, UCAM-CL-TR-713. University of Cambridge, Comp.Lab., 2008[12] V. Srinivasan, M. Motani, and W. T. Ooi, “Analysis and implications of student contact patterns derived from campus schedules,” in Proc.ACM MobiCom, Los Angeles,CA, Sep.2006,pp.86–97.[13] CHEN, Yuanzhu, et al. Delay-tolerant networks and network coding: Comparative studies on simulated and real device experiments. Computer Networks, 2015, 83: 349-362.[14] OSTOVARI, Pouya; KHREISHAH, Abdallah; WU, Jie. Broadcasting with hard deadlines in wireless multihop networks using network coding. Wireless Communications and Mobile Computing, 2015, 15.5: 983-999.[15] Ostovari, Pouya, Jie Wu, and Abdallah Khreishah. "Deadline-aware broadcasting in wireless networks with local network coding." Computing, Networking and Communications (ICNC), 2012 International Conference on. IEEE, 2012.[16] Spyropoulos, Thrasyvoulos, Konstantinos Psounis, and Cauligi S. Raghavendra. "Spray and wait: an efficient routing scheme for intermittently connected mobile networks." Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking. ACM, 2005.[17] Xiao, Mingjun, Jie Wu, and Liusheng Huang. "Community-aware opportunistic routing in mobile social networks." IEEE Transactions on Computers 63.7 (2014): 1682-1695.[18] Jorg Widmer, Jean-Yves Le Boudec, Network coding for efficient communication in extreme networks, in: Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking, 2005, pp. 284–291.[19] A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott, “Impact of human mobility on the design of opportunistic forwarding algorithms,” in Proc. INFOCOM, April 2006.[20] T. Karagiannis, J.-Y. Le Boudec, and M. Vojnovic, “Power law and exponential decay of inter contact times between mobile ´ devices,” in ACM MobiCom ’07, 2007.[21] J. Leguay, A. Lindgren, J. Scott, T. Friedman, and J. Crowcroft, “Opportunistic content distribution in an urban setting,” in ACM CHANTS, 2006, pp. 205–212.[22] Socievole, Annalisa, Floriano De Rango, and Antonio Caputo. "Wireless contacts, Facebook friendships and interests: Analysis of a multi-layer social network in an academic environment." 2014 IFIP Wireless Days (WD). IEEE, 2014.[23] https://github.com/NCCU-MCLAB/NCCU-Trace-Data[24] L. Li, R. Ramjee, M. Buddhikot, and S. Miller, “Network coding-based broadcast in mobile ad-hoc networks,” in IEEE INFOCOM, May 2007.[25] http://www.investopedia.com/terms/t/timevalue.asp[26] 郭振茂, "淺談選擇權評價Black-Scholes 公式中希臘字母的應用", 2003[27] https://en.wikipedia.org/wiki/Greeks_(finance)[28] A. Ker¨anen, J. Ott, and T. K¨arkk¨ainen. The ONE Simulator for DTN Protocol Evaluation. In Proceedings of the 2nd International Conference on Simulation Tools and Techniques, March 2009.[29] Marin, Radu-Corneliu, Ciprian Dobre, and Fatos Xhafa. "Exploring Predictability in Mobile Interaction." EIDWT. 2012. zh_TW