跳到主要內容

簡易檢索 / 詳目顯示

研究生: 張偉立
Wei-Li Chang
論文名稱: Detecting Critical Members in a Moving Group of Wireless Ad Hoc Networks
指導教授: 吳曉光
Eric Hsiao-kuang Wu
口試委員:
學位類別: 博士
Doctor
系所名稱: 資訊電機學院 - 資訊工程學系
Department of Computer Science & Information Engineering
論文出版年: 2013
畢業學年度: 101
語文別: 英文
論文頁數: 72
中文關鍵詞: 關節點區域深先搜尋省電
外文關鍵詞: depth first search, power saving, articulation points
相關次數: 點閱:11下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 無線動態隨意網絡(Mobile Ad hoc networks) 是一群節點藉由網絡傳輸連結而組成, 其中有一部份節點, 我們稱之為關節點(Articulation points), 也就是說, 在網絡中將移開關節點, 網絡將會分裂成一個以上不同的子網絡, 導致傳遞的資訊無法互相溝通. 相關文獻提出在靜態的網路(Static Networks) 之下偵測關節點, 然而在動態的網路 (Dynamic Networks)之下快速和準確的偵測關節點是一個挑戰. 這篇博士論文動機緣起於, 報章新聞報導一群人出遊, 常有走失現象, 例如: 老師帶小朋友出遊, 老人出遊, 甚至是車隊出遊, 這樣的活動由於人數多, 在管理和監控上不易, 基於此首先我們提出了區域深先搜尋法(Localized Depth First Search)來解決在動態網路下偵測關節點這個問題. 接下來考慮到省電(Power Saving)的議題, 在動態網路之下, 無線網路裝置的電量是有限的, 如何在不影響關節點偵測之下, 達到最省電的機制, 我們提出了省電搜尋法(Power Saving-LDFS), 實驗結果表示, 我們的方法在訊息負載, 偵測速度 ,電量節省上皆有較優秀的表現.


    The articulation points in the induced graph of a network are known to be critical in terms of maintaining the connectivity of the network as most of the routing paths between nodes in the network have to pass through them. To detect articulation points, the previous works assume the setting of static networks. However, in case when a group of people move together, their mobile devices forms a highly dynamic mobile ad hoc network and the behavior of nodes in such a network can be a challenge when it comes to detecting articulation points. In this paper, we propose a distributed algorithm, namely Localized Depth-First-Search (LDFS), to identify articulation points efficiently in mobile ad hoc networks. The algorithm sets multiple initiators to send probing packets and a bound for the hop count of the probing packets in order to improve the accuracy rate and message overhead at the same time. The simulation results show that our LDFS algorithm outperforms the other well-known protocols, which suggest that LDFS is a better solution for articulation point detection to prevent possible losses in a group of moving nodes. In second part, we proposed a Power-Saving LDFS protocol to save power of node and still maintain the connectivity of network. The performance of energy consumption is better than original case.

    Abstract in Chinese i Abstract in English ii Acknowledgements iii Table of Contents iv List of Figures vii List of Tables ix List of Abbreviations x 1 Introduction 1 1.1 Contributions 3 1.1.1 Purpose 3 1.1.2 Motivation 4 1.1.3 Contributions in Brief 5 1.2 Thesis Organization 6 2 Related Work and Background Knowledge 7 2.1 Algorithms for Detecting Articulation Points 7 2.1.1 Centralized Detection Algorithm for Articulation Points 7 2.1.2 Localized Detection Algorithm for Articulation Points 8 2.2 Topology Control and Power Saving Algorithms 10 2.2.1 Homogeneous Topology Control Algorithms 12 2.2.2 Non-homogeneous Topology Control Algorithms 12 2.2.2.1 Location-based Topology Control Algorithms 13 2.2.2.2 Neighbor-based Topology Control Algorithms 14 3 Detecting Articulation Points in Mobile Networks 17 3.1 Proposed LDFS Algorithm 17 3.1.1 Localized Depth-First-Search 17 3.1.2 Data Structure and Message Format 18 3.1.3 LDFS Algorithm and Flow Chart 21 3.1.4 LDFS Optimization 26 3.1.5 Time Cost of LDFS 27 3.1.6 Algorithm Analysis 27 3.2 Simulation Results 29 3.2.1 Average Delay 31 3.2.2 Message Overhead 35 3.2.3 Correctness 37 3.3 Summary 39 4 Power Saving for LDFS Algorithm 39 4.1 Proposed PS-LDFS 41 4.1.1 Detecting Bridges Phase (DB) 43 4.1.2 Adjusting Transmitting Power Phase (ATP) 45 4.1.3 Node Serialize Trigger (NST) 48 4.1.4 Avoid Partitions and Topology Maintaining 49 4.2 Simulations Results 50 4.2.1Average Delay 52 4.2.2Energy Consumption 54 4.3 Summary 56 5. Conclusions and Future Works 57 Bibliography 58

    Bibliography

    [1] S. Saroiu, P. Gummadi, and S. Gribble, "A Measurement Study of Peer-to-Peer File Sharing Systems," in Proceedings of Multimedia Computing and Networking (MMCN), 2002.
    [2] F. Buckley and M. Lewinter, A Friendly Introduction to Graph Theory, 2002.
    [3] X. Liu, L. Xiao, A. Kreling, and Y. Liu, "Optimizing Overlay Topology by Reducing Cut Vertices," in Proceedings of ACM NOSSDAV, 2006.
    [4] B. Awerbuch, "A New Distributed Depth-First Search Algorithm," Information Processing Letters, vol. 20, pp. 147-150, 1985.
    [5]. Andrew Kreling, Yunhao Liu, Xiaomei Liu, Li Xiao. “Optimizing overlay topology by reducing cut vertices.” NOSSDAV, 17, 2006.
    [6]. O. Younis, S. Fahmy, and P. Santi, "An architecture for robust sensor network communications," International Journal on Distributed Sensor Networks (IJDSN), Special issue on localized communication and topology protocols for sensor networks, 2005.
    [7] W. Zhang, G. Xue, and S. Misra, "Fault-tolerant relay node placement in wireless sensor networks: problems and algorithms," in Proceedings of IEEE INFOCOM, 2007.
    [8] T. Q. Qiu, E. Chan, and G. Chen, "Overlay Partition: Iterative Detection and Proactive Recovery," in Proceedings of IEEE ICC,2007.
    [9] B. Krishnamurthy, S. Sen, Y. Zhang, and Y. Chen, "Sketchbased Change Detection: Methods, Evaluation, and Applications," in Proceedings of ACM SIGCOMM Internet Measurement Conference (IMC), 2003.
    [10] S. Kim and A. L. N. Reddy, "Image-based Anomlay Detection Technique: Algorithm, Implementation and Effectiveness"," IEEE JSAC, 2006.
    [11] N. Hu, L. E. Li, Z. M. Mao, P. Steenkiste, and J. Wang, "Locating Internet Bottlenecks: Algorithms, Measurements, and Implications," in Proceedings of ACM SIGCOMM, 2004.
    [12] D. Dumitriu, E. Knightly, I. Stoica, and W. Zwaenepoel, "Denial of Service Resilience in Peer-to-Peer File Sharing Systems," in Proceedings of ACM SIGMETRICS, 2005.
    [13] Carlos, Andre, Reis Pinheiro, “Social Network Analysis in Telecommunications.” John Wiley and Sons, 2011.
    [14] Rosales-Hain, R. Ramanathan, “Topology control of multihop wireless networks using transmit power adjustment”. INFOCOM, 2:404 – 413, 2000.
    [15] Y. Zhu and Y. Hu, "Making Peer-to-Peer Anonymous Routing Resilient to Failures," in Proceedings of IPDPS, 2007.
    [16] T. Q. Qiu, E. Chan, and G. Chen, "Overlay Partition: Iterative Detection and Proactive Recovery," in Proceedings of IEEE ICC, 2007.
    [17] J. Mirkovic, G. Prier, and P. Reiher, "Attacking DDoS at the Source," in Proceedings of IEEE ICNP, 2002.
    [18] P. Keyani, B. Larson, and M. Senthil, "Peer Pressure: Distributed Recovery from Attacks in Peer-to-Peer Systems," in Proceedings of IFIP Workshop on Peer-to-Peer Computing, 2002.
    [19] Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, and S. Shenker, "Making Gnutella-like P2P Systems Scalable," in Proceedings of ACM SIGCOMM, 2003.
    [20] Yunhao Liu, Baijian Yang, Yuan He, Hao Ren. “On The Reliability of Large-scale Distributed systems - A Topological View.” computer Networks, 53:2140–2152, 2009.
    [21] M. Li, W.-C. Lee, and A. Sivasubramaniam, "DPTree: A Balanced Tree Based Indexing Framework For Peer-To-Peer Systems," in Proceedings of IEEE ICNP, 2006.
    [22] L. Ramaswamy, B. Gedik, and L. Liu, "A Distributed Approach to Node Clustering in Decentralized Peer-to-Peer Networks," IEEE Transactions on Parallel and Distributed Systems, 2005.
    [23]. Nicholas D. Lane, Emiliano Miluzzo, “A Survey of Mobile Phone Sensing,” A Survey of Mobile Phone Sensing 2009
    [24]. R. Tarjan, “Depth First Search and Linear Graph Algorithms,” SIAM J. Comp., vol. 1, no. 2, 1972, pp. 146–60.
    [25]. D. Goyal and J. Caffery, “Partitioning Avoidance in Mobile Ad Hoc Net-works using Network Survivability Concepts,” Proc. IEEE ISCC, Taormina, Italy, July 2002, pp. 553–58.
    [26]. Tracy Camp*, Jeff Boleng, and Vanessa Davies, “A survey of mobility models for ad hoc network research,” Wireless Communications and Mobile Computing, Volume 2, Issue 5, pages 483–502,August 2002.
    [27]. Mathew D. Penrose, “On k-connectivity for a geometric random graph,” Random Structures & Algorithms, Volume 15, Issue 2, pages 145–164,September 1999.
    [28].Xiaohua Jia, Dongsoo Kim, Sam Makki, Peng-Jun Wan, Chih-Wei Yi, “Power Assignment for k-Connectivity in Wireless Ad Hoc Networks,” Journal of Combinatorial Optimization, March 2005, Volume 9, Issue 2, pp 213-222.
    [29]. Suresh Singh, Mike Woo, C. S. Raghavendra, “Power-aware routing in mobile ad hoc networks,” MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking Pages 181-190

    [30]. S. Narayanaswamy, V. Kawadia, R. S. Sreenivas, and P. R. Kumar, “Power control in ad-hoc networks: Theory, architecture, algorithm and implementation of the COMPOW protocol,” in European Wireless Conference, 2002.
    [31]. Penrose, M, “The longest edge of the random minimal spanning tree,” Annals Appl. Probab. 7, 2, 340–361, 1997.
    [32]. Penrose, M, “Extremes for the minimal spanning tree on normally distributed points,” Advances Appl. Probab. 30, 628–639, 1998.
    [33]. Dette, H. and Henze, N, “The limit distribution of the largest nearest-neighbor link in the unit d-cube,” J. Appl. Probab. 26, 67–80, 1989.
    [34]. Holst, L, “On multiple covering of a circle with random arcs,” J. Appl. Probab. 16, 284–290.1980
    [35]. Panchapakesan, P. and Manjunath, D, “On the transmission range in dense ad hoc radio networks,” InProceedings of IEEE Signal Processing Communication (SPCOM), 2001.
    [36]. Santi, P., Blough, D., and Vainstein, F, “A probabilistic analysis for the range assignment problem in ad hoc networks,” in Proceedings of ACM Mobihoc. 212–220, 2001.
    [37]. Kirousis, L., Kranakis, E., Krizanc, D., and Pelc, “Power consumption in packet radio networks,” Theoret. Comput. Sci. 243, 289–305.2000
    [38].Clememti, A., Ferreira, A., Penna, P., Perennes, S.,and Sielvestri, R, “Hardness results for the power range assignment problem in packet radio networks,” in Proceedings of the 2nd International Workshop on Approximation Algorithms for Combinatorial Optimization Problems (RANDOM/APPROX). 197–208, 1999.
    [39]. Clememti, A., Ferreira, A., Penna, P., Perennes, S.,and Sielvestri, R, “The power range assignment problem in radio networks on the plane,” in Proceedings of the 17th Symposium on Theoretical Aspects of Computer Science (STACS). 651–660.2001
    [40]. Clememti, A., Ferreira, A., Penna, P., Perennes, S.,and Sielvestri, R, “The minimum range assignment problem on linear radio networks,” in Proceedings of the 8th European Symposium on Algorithms (ESA). 143–154. 2000
    [41]. Rodoplu, V. and Meng, T, “Minimum energy mobile wireless networks,” IEEE J. Select. Areas Comm. 17, 8, 1333–1344, 1999

    QR CODE
    :::