政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/60239
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文筆數/總筆數 : 113318/144297 (79%)
造訪人次 : 50963997      線上人數 : 921
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    政大機構典藏 > 資訊學院 > 資訊科學系 > 學位論文 >  Item 140.119/60239
    請使用永久網址來引用或連結此文件: https://nccur.lib.nccu.edu.tw/handle/140.119/60239


    題名: 耐延遲車載網路上利用網路編碼之位置輔助路由
    Location assisted routing with network coding in vehicular delay tolerant networks
    作者: 陳界誠
    Chen, Chieh Cheng
    貢獻者: 蔡子傑
    Tsai, Tzu-Chieh
    陳界誠
    Chen, Chieh Cheng
    關鍵詞: 耐延遲網路
    路由協定
    網路編碼
    Delay tolerant network
    routing
    network coding
    日期: 2010
    上傳時間: 2013-09-04 17:05:58 (UTC+8)
    摘要: 耐延遲網路(Delay Tolerant Networks)上的路由協定可以區分為兩大類:flooding-based protocols 跟forwarding-based protocols。網路編碼(Network Coding)是一種編碼技術可以提高訊息傳輸的可靠度;並且運作時不需要知道整體網路的拓樸資訊。
    我們提出的演算法結合了flooding-based protocols 跟forwarding-based protocol特性,最主要的概念是讓訊息不是被傳送給每一個節點,而是傳送給朝向目的地或是接近目的地的節點。當節點相遇時,我們的方法會利用節點的路徑、移動方向與速度去預測到達目的地的機率。同時我們利用網路編碼的技巧傳送編碼後的資料來代替訊息的片段,來避免重複傳送多餘的訊息;並讓通訊更加可靠。根據實驗模擬的結果,我們的機制有較好的效能,特別是在頻寬的使用上。
    The routing protocols of delay tolerant networks could be divided in two categories: flooding-based protocols and forwarding-based protocols. Network coding is an encoding technique that could make data transmission more reliable. It operates without the needed of information about the network topology.
    We proposed a routing protocol integrating the characteristic of flooding-based protocol and forwarding-based protocol. The main idea of our protocol is to let message would not be flooded to every node but to the nodes moving toward or moving closer to destination. When nodes contact with each other, our approach will use the path of node, node’s moving direction and its velocity to estimate the probability to reach the destination of message. At the same time, we exploit network coding to transmit coded block instead of message fragment in order to avoid sending redundant replication, make data transmit more reliable and more robust to packet losses or delays. From the result of simulation, we could see that our protocol have a higher performance especially in the bandwidth consumption compared to other protocols.
    參考文獻: [1] Jian Shen, Sangman Moh, and Ilyong Chung, “Routing Protocols in Delay Tolerant Networks: A Comparative Survey” in International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC’ 08), July 2008
    [2] R. Ahlswede, N. Cai, S.-Y. R. Li, and R.W. Yeung, “Network information flow,” IEEE Trans. on Information Theory, vol. 46, no. 4, July 2000.
    [3] T. Ho, R. Koetter, M. Medard, D. R. Karger, and M.Effros. “The benefits of coding over routing in a randomized setting”International Symposium on Information Theory (ISIT), page 442, July 2003
    [4] P. A. Chou, Y. Wu, and K. Jain. Practical network coding. In Proc. Allerton, Oct. 2003.
    [5] R. H. Frenkiel, B. R. Badrinath, J. Borres, and R. D. Yates, “The infostations challenge: balancing cost and ubiquity in delivering wireless data,” IEEE Personal Communications, vol. 7, no. 2, pp. 66–71, 2000
    [6] D. Nain, N. Petigara, and H. Balakrishnan,“Integrated routing and storage for messaging applications in mobile ad hoc networks,” Mobile Networks and Applications (MONET), vol. 9, pp. 595–604, December 2004.
    [7] T. Spyropoulos, K. Psounis, and C. S. Raghavendra,“Spray and wait: an efficient routing scheme for intermittently connected mobile networks,” in Proceedings of the ACM SIGCOMM Workshop on Delay-Tolerant Networking (WDTN’05), pp. 252–259, August 2005.
    [8] A. Demers, D. Greene, C. Houser, W. Irish, J. Larson, S. Shenker, H. Sturgis, D. Swinehart, and D. Terry,“Epidemic algorithms for replicated database maintenance,” SIGOPS Operating Systems Review, vol. 22, pp. 8–32, January 1988.
    [9] A. Vahdat and D. Becker, “Epidemic routing for partially-connected ad hoc networks,” Tech. Rep. CS-2000-06, Duke University, July 2000.
    [10] J. Lebrun, C.-N. Chuah, D. Ghosal, and M. Zhang,“Knowledge-based opportunistic forwarding in vehicular wireless ad hoc networks,” in Proceedings of
    IEEE Vehicular Technology Conference (VTC), vol. 4, pp. 2289–2293, May 2005.
    [11] P. Juang, H. Oki, Y. Wang, M. Martonosi, L. S. Peh, and D. Rubenstein, “Energy-efficient computing for wildlife tracking: design tradeoff’s and early experiences with zebranet,” in Proceedings of ASPLOS-X, pp. 96–107, October 2002.
    [12] A. Lindgren, A. Doria, and O. Schel´en, “Probabilistic routing in intermittently connected networks,” Lecture Notes in Computer Science, vol. 3126, pp. 239–254, January 2004.
    [13] S. Jain, K. Fall, and R. Patra, “Routing in a delay tolerant network,” in Proceedings of ACM SIGCOMM, vol. 34, pp. 145–158, ACM Press, October 2004.
    [14] C. Gkantsidis and P. Rodriguez. Network coding for large scale content distribution. In Infocom, Miami,FL, Mar. 2005.
    [15] C. Gkantsidis, J. Miller and P. Rodrques. Comprehensive view of a live network coding P2P system
    [16] S. Katti, H. Rahul, D. Katabi, W. Hu M. M´edard, and J. Crowcroft. XORs in the Air:
    Practical Wireless Network Coding. In SIGCOMM, 2006.
    [17] U. Lee, J.-S. Park, J. Yeh, G. Pau, and M. Gerla. “CodeTorrent: Content Distribution using Network Coding in VANETs. “ in MobiShare’06, Los Angeles, CA, Sept. 2006.
    [18] S. Ahmed and S. S. Kanhere, “VANETCODE: Network coding to enhance cooperative downloading in vehicular ad-hoc networks,” in Proc. ACM Int. Conf. on Commun. And Mobile Comput., 2006, pp. 527–532.
    [19] J. Widmer and J.-Y. LeBoudec. “Network coding for efficient communication in extreme networks. “ in WDTN, Aug. 2005.
    [20] X. Zhang, G. Neglia, J. Kurose, D. Towsley. “On the Benefits of Random Linear Coding for Unicast Applications in Disruption Tolerant Networks. “ in Second Workshop on Network Coding, Theory, and Applications. 2006
    [21] A. Keränen, J. Ott, and T. Kärkkäinen, "The ONE Simulator for DTN Protocol Evaluation," in SIMUTools`09: 2nd International Conference on Simulation Tools and Techniques, Rome, March 2-6, 2009.
    描述: 碩士
    國立政治大學
    資訊科學學系
    97753003
    99
    資料來源: http://thesis.lib.nccu.edu.tw/record/#G0097753003
    資料類型: thesis
    DOI 連結: http://dx.doi.org/10.1109/ICCChina.2012.6356967
    DOI: 10.1109/ICCChina.2012.6356967
    顯示於類別:[資訊科學系] 學位論文

    文件中的檔案:

    檔案 大小格式瀏覽次數
    300301.pdf730KbAdobe PDF2218檢視/開啟


    在政大典藏中所有的資料項目都受到原著作權保護.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋