政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/119800
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113648/144635 (79%)
Visitors : 51596100      Online Users : 890
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/119800


    Title: 利用間歇連線P2P訊息擴散機制的WaterChat APP設計
    A WaterChat APP Based on intermittent-connected P2P Message flooding Mechanism
    Authors: 羅尉晉
    LUO, WEI-JIN
    Contributors: 蔡子傑
    Tsai, Tzu-Chieh
    羅尉晉
    LUO, WEI-JIN
    Keywords: 間歇連結移動網路
    行動隨機網路
    Intermittently connected networks
    Opportunistic mobile network
    Date: 2018
    Issue Date: 2018-08-29 16:04:18 (UTC+8)
    Abstract: 近年來隨著行動裝置及行動網路的普及,使得社群網路及各種社交聊天應用已融入使用者生活之中,但在許多場合如集會遊行、陳情抗議、大型室內外活動,因人潮聚集,使得行動無線網路訊號壅塞,致訊息無法正常傳遞。而隨著WiFi Direct及Bluetooth 4.0等無線技術的普及,行動裝置間的連線有了更多的選擇。
    本論文研究中,參考WaterChat的概念,重新設計一個可彈性適用於四種聊天情境地系統架構,搭配兩種私人聊天室的邀請模式,利用控制閥值以及監測節點連線及同步,減少Flooding造成的效率低落。
    實作一個基於隨機性社交網路且適用多聊天情境的社交聊天應用並加入了異地同步的機制,使得訊息傳遞範圍不再囿限於現實的地理限制,並在最後探討訊息加密的可能,提出並實作一新穎且功能完備的多群組行動聊天情境應用。
    With the popularization of mobile devices and mobile networks, social networks and various social chat applications have played an important role in users’ daily life. However, in several large-scale events like protests or indoor/outdoor activities with large amount of people, due to mobile wireless network signal congestion, messages cannot be transmitted normally. Nowadays, new wireless technologies such as Wi-Fi Direct and Bluetooth 4.0 has provided more connection choices between mobile devices.
    First, we redesigned a system architecture based on the concept of WaterChat which is flexible and suitable for four different chat scenarios. Users can choose one of two invitation modes depending on their privacy requirements. Secondly, to solve flooding in opportunistic mobile network, we present threshold and connection control to improve the efficiency in our system. We also present an off-site synchronization, so the message transmission scope is no longer limited to the physical geographical restrictions. In the end, we will some discuss security issue and how to encrypt messages in four chat scenarios.
    To sum up, we design and implement a novel and full-featured WaterChat App based on intermittent-connected P2P Message flooding Mechanism.
    Reference: [1] FireChat, Retrieved January, 15, 2017 from http://opengarden.com/firechat/
    [2] Apple iOS MultipeerConnectivity Framework, Retrieved January, 15, 2017 https://developer.apple.com/documentation/multipeerconnectivity/
    [3] Misra, S., Saha, B. K., & Pal, S. (2016). Opportunistic mobile networks.
    [4] Pelusi, L., Passarella, A., & Conti, M. (2006). Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE communications Magazine, 44(11).
    [5] Gao, W., & Li, Q. (2013, April). Wakeup scheduling for energy-efficient communication in opportunistic mobile networks. In INFOCOM, 2013 Proceedings IEEE (pp. 2058-2066). IEEE.
    [6] Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance vector (AODV) routing (No. RFC 3561).
    [7] Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. Mobile computing, 153-181.
    [8] Trifunovic, S., Distl, B., Schatzmann, D., & Legendre, F. (2011, September). WiFi-Opp: ad-hoc-less opportunistic networking. In Proceedings of the 6th ACM workshop on Challenged networks (pp. 37-42). ACM.
    [9] Vu, L., Nahrstedt, K., Retika, S., & Gupta, I. (2010, October). Joint bluetooth/wifi scanning framework for characterizing and leveraging people movement in university campus. In Proceedings of the 13th ACM international conference on Modeling, analysis, and simulation of wireless and mobile systems (pp. 257-265). ACM.
    [10] Funai, C., Tapparello, C., & Heinzelman, W. (2016, December). Mobile to Mobile Computational Offloading in Multi-hop Cooperative Networks. In Global Communications Conference (GLOBECOM), 2016 IEEE (pp. 1-7). IEEE.
    [11] Funai, C., Tapparello, C., & Heinzelman, W. (2015). Supporting multi-hop device-to-device networks through WiFi direct multi-group networking. arXiv preprint arXiv:1601.00028.
    [12] Mao, Z., Jiang, Y., Min, G., Leng, S., Jin, X., & Yang, K. (2017). Mobile social networks: Design requirements, architecture, and state-of-the-art technology. Computer Communications, 100, 1-19.
    [13] Ott, J., & Pitkanen, M. J. (2007, June). Dtn-based content storage and retrieval. In World of Wireless, Mobile and Multimedia Networks, 2007. WoWMoM 2007. IEEE International Symposium on a (pp. 1-7). IEEE.
    [14] Liu, H. Q., Zhao, S. W., & Shang, J. (2014). Research on Delay-Tolerant Network and Increasing Probability of Opportunistic Communication. In Applied Mechanics and Materials (Vol. 496, pp. 2095-2098). Trans Tech Publications.
    [15] Conti, M., Delmastro, F., Minutiello, G., & Paris, R. (2013, November). Experimenting opportunistic networks with WiFi Direct. In Wireless Days (WD), 2013 IFIP (pp. 1-6). IEEE.
    [16] Keränen, A., Ott, J., & Kärkkäinen, T. (2009, March). The ONE simulator for DTN protocol evaluation. In Proceedings of the 2nd international conference on simulation tools and techniques (p. 55). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).
    [17] Moreira, W., Ferreira, R., Cirqueira, D., Mendes, P., & Cerqueira, E. (2013, September). SocialDTN: a DTN implementation for digital and social inclusion. In Proceedings of the 2013 ACM MobiCom workshop on Lowest cost denominator networking for universal access (pp. 25-28). ACM.
    [18] Tsai, T. C., Liu, T. S., & Han, C. C. (2017). WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks. Journal of Communications, 12(7).
    [19] Tsai, T. C., Chan, H. H., Han, C. C., & Chen, P. C. (2016, November). A Social Behavior Based Interest-Message Dissemination Approach in Delay Tolerant Networks. In International Conference on Future Network Systems and Security (pp. 62-80). Springer International Publishing.
    [20] Tsai, T. C., Han, C. C., & Yen, S. Y. (2016, November). Collaborative Network Coding in Opportunistic Mobile Social Network. In International Conference on Future Network Systems and Security (pp. 187-194). Springer International Publishing.
    [21] Tsai, T. C., & Chan, H. H. (2015). NCCU Trace: Social-network-aware mobility trace. IEEE Communications Magazine, 53(10), 144-149.
    [22] Chen, Y., Liu, X., Liu, J., Taylor, W., & Moore, J. H. (2015). Delay-tolerant networks and network coding: Comparative studies on simulated and real-device experiments. Computer Networks, 83, 349-362.
    [23] Xiao, M., Wu, J., & Huang, L. (2014). Community-aware opportunistic routing in mobile social networks. IEEE Transactions on Computers, 63(7), 1682-1695.
    [24] Kwon, T. J., & Gerla, M. (2002). Efficient flooding with passive clustering (PC) in ad hoc networks. ACM SIGCOMM Computer Communication Review, 32(1), 44-56.
    [25] Sasson, Y., Cavin, D., & Schiper, A. (2003, March). Probabilistic broadcast for flooding in wireless mobile ad hoc networks. In Wireless Communications and Networking, 2003. WCNC 2003. 2003 IEEE (Vol. 2, pp. 1124-1130). IEEE.
    [26] Shukla, S., Munjal, A., & Singh, Y. N. (2015). Routing protocol Approaches in Delay Tolerant Networks. In International Conference on Educational and Information Technology MCNC(pp. 91-95).
    [27] Baker, C. E., Starke, A., Xing, S., & McNair, J. (2017, May). Demo abstract: A research platform for real-world evaluation of routing schemes in delay tolerant social networks. In Computer Communications Workshops (INFOCOM WKSHPS), 2017 IEEE Conference on (pp. 978-979). IEEE.
    [28] Zhai, Y., Bai, X., & Liu, Q. (2017, July). Incentive mechanisms in mobile delay tolerant network. In Electronics Information and Emergency Communication (ICEIEC), 2017 7th IEEE International Conference on (pp. 184-188). IEEE.
    [29] Wang, X., Zhang, Y., Leung, V. C., Guizani, N., & Jiang, T. (2018). D2D Big Data: Content Deliveries over Wireless Device-to-Device Sharing in Large-Scale Mobile Networks. IEEE Wireless Communications, 25(1), 32-38.
    [30] Qin, X., Xie, G., & Gao, J. (2017, July). A dynamic topological potential and social relationship based routing protocol for mobile social delay tolerant networks. In Computer, Information and Telecommunication Systems (CITS), 2017 International Conference on (pp. 98-102). IEEE.
    [31] Mao, Z., Jiang, Y., Min, G., Leng, S., Jin, X., & Yang, K. (2017). Mobile social networks: Design requirements, architecture, and state-of-the-art technology. Computer Communications, 100, 1-19.
    [32] Zhang, Y., Song, L., Jiang, C., Tran, N. H., Dawy, Z., & Han, Z. (2017). A social-aware framework for efficient information dissemination in wireless ad hoc networks. IEEE Communications Magazine, 55(1), 174-179.
    [33] Trifunovic, S., Kouyoumdjieva, S. T., Distl, B., Pajevic, L., Karlsson, G., & Plattner, B. (2017). A decade of research in opportunistic networks: challenges, relevance, and future directions. IEEE Communications Magazine, 55(1), 168-173.
    [34] Liu, X., Li, Z., Yang, P., & Dong, Y. (2017). Information-centric mobile ad hoc networks and content routing: a survey. Ad Hoc Networks, 58, 255-268.
    [35] Zhou, H., Leung, V. C., Zhu, C., Xu, S., & Fan, J. (2017). Predicting temporal social contact patterns for data forwarding in opportunistic mobile networks. IEEE Transactions on Vehicular Technology, 66(11), 10372-10383.
    [36] Liu, Y., Wu, H., Xia, Y., Wang, Y., Li, F., & Yang, P. (2017). Optimal online data dissemination for resource constrained mobile opportunistic networks. IEEE Transactions on Vehicular Technology, 66(6), 5301-5315.
    [37] Li, F., Jiang, H., Li, H., Cheng, Y., & Wang, Y. (2017). SEBAR: social-energy-based routing for mobile social delay-tolerant networks. IEEE Transactions on Vehicular Technology, 66(8), 7195-7206.
    [38] Liu, Y., Wang, K., Guo, H., Lu, Q., & Sun, Y. (2017). Social-aware computing based congestion control in delay tolerant networks. Mobile Networks and Applications, 22(2), 174-185.
    [39] Jedari, B., Liu, L., Qiu, T., Rahim, A., & Xia, F. (2017). A game-theoretic incentive scheme for social-aware routing in selfish mobile social networks. Future Generation Computer Systems, 70, 178-190.
    [40] Daly, E. M., & Haahr, M. (2007, September). Social network analysis for routing in disconnected delay-tolerant manets. In Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing (pp. 32-40). ACM.
    [41] Gao, W., Li, Q., Zhao, B., & Cao, G. (2009, May). Multicasting in delay tolerant networks: a social network perspective. In Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing (pp. 299-308). ACM.
    Description: 碩士
    國立政治大學
    資訊科學系碩士在職專班
    102971005
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0102971005
    Data Type: thesis
    DOI: 10.6814/THE.NCCU.EMCS.006.2018.B02
    Appears in Collections:[Executive Master Program of Computer Science of NCCU] Theses

    Files in This Item:

    File SizeFormat
    100501.pdf1134KbAdobe PDF27View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback