跳到主要內容

臺灣博碩士論文加值系統

(44.192.20.240) 您好!臺灣時間:2024/02/27 11:55
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:陳信儒
研究生(外文):Hsin-Ju Chen
論文名稱:基於行動隨意網路架構中建置情境行動管理人來支援情境感知環境
論文名稱(外文):A Framework of Mobile Context Management for Supporting Context-Aware Environments in Mobile Ad Hoc Networks
指導教授:陳宗禧陳宗禧引用關係
指導教授(外文):Tzung-Shi Chen
學位類別:碩士
校院名稱:國立臺南大學
系所名稱:數位學習科技學系
學門:教育學門
學類:教育科技學類
論文種類:學術論文
論文出版年:2007
畢業學年度:95
語文別:英文
論文頁數:62
中文關鍵詞:情境感知計算發佈/訂閱架構行動隨意網路重疊網路情境
外文關鍵詞:publish/subscribe architecturecontext-aware computingcontextoverlap networkmobile ad hoc networks
相關次數:
  • 被引用被引用:0
  • 點閱點閱:159
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:2
隨著無線網路技術的發展,許多通訊設備都具有上網的功能,即便沒有固定的網路架構,也可以透過行動裝置之間的通訊形成一個行動隨意網路。在行動隨意網路中,每一個行動裝置都扮演傳送資料的節點,可以方便彼此之間資料的查詢與分享,建置上快速及彈性的特性,通常被運用於緊急事件發生時,如果能在第一時間將事件所發生的時間與地點通知或警告其他的節點,便能避免意外發生或加快處理與救援的速度。本論文中,我們將網路的節點分成四種角色,分別是情境提供者、行動情境管理者、服務要求者及一般節點,利用所有的節點在行動網路的架構下建置一個虛擬重疊網路(virtual overlap network)來增加資料傳送的效率及成功率,同時也考慮到即時與非即時的狀況,提出兩種不同的傳輸方式來傳輸資料。當環境週遭的情境(context)資訊被取得後,若是屬於即時的事件便採用主動告知的方式來通知附近的使用者,並且適當地劃分出傳送的範圍;反之則利用被動查詢的方式,服務要求者會選擇一個行動情境管理者做查詢,當行動情境管理者無法提供足夠的資訊時,行動情境管理者之間便會建構一個樹狀的虛擬骨幹網路來幫助資料的收尋,我們也會探討行動情境管理者的選擇方式、如何建構出行動情境管理者網路以及重疊網路的維護機制,並希望所提出的架構可以支援情境感知環境。最後,我們設定參數來模擬各種情況所產生的影響以及效能,實驗結果顯示出我們所提出的架構與方法優於其他相同類似的架構。
With the development of wireless technology, more and more mobile devices have capability of communicating with each other. Mobile ad hoc networks (MANETs) will be still established by mobile devices even without relying on any fixed infrastructure. Due to the characteristics of rapidly deployment and flexible construction, MANETs usually have attractive application on traffic accident or digital life. In this thesis, we present a virtual overlap network and two approaches to improve the efficient of data delivery in MANETs. And then we hope that our architecture is able to support context-aware environments. All mobile nodes in our model included four roles: context providers, service requestors, mobile context managers and common mobile nodes. Simultaneously, the surrounding context of mobile nodes is used to determine either push-based approach or pull-based approach. When real-time event happened, push-based approach will be adopted to warn neighbor nodes. On the contrary, pull-based approach will be adopted and the virtual backbone named segment tree network will be constructed to help search more contextual information. In addition, mobile context manger selection, segment-tree virtual network construction and segment tree maintenance will be also discussed in our thesis. Finally, we will conduct the simulations to evaluate the performance of our methods. The experimental result shows that our methods outperform publish/subscribe architecture based on AODV routing protocol.
摘 要 i
ABSTRACT ii
誌 謝 iii
Contents iv
Lists of Figures v
1. Introduction 1
1.1 Background 1
1.2 Motivation 3
2. Related Work 5
3. System Model and Basic Idea 8
3.1 Assumptions 9
3.2 An Architecture of Overlap network 10
3.3 Context-aware Computing System 14
3.4 Context Definition 17
4. Mobile Context Management Mechanisms 20
4.1 Packets and Table Structure Definition 20
4.2 Pull-based Approach 23
4.2.1 Dynamic Mobile Context Manager Selection 23
4.2.2 Segment-tree Virtual Network Construction 27
4.2.3 Nodes Joint and Leaving 30
4.2.4 Handoff Mechanism 33
4.3.5 Segment-tree Virtual Network Maintenance 34
4.3 Push-based Approach 36
5. Experimental Results 39
5.1 Simulation Model 39
5.2 Simulation Results 40
5.2.1 MCM Selection based on Distance vs. Resource 40
5.2.2 Success Ratio 41
5.2.3 Delay Time 43
5.2.4 Overhead 45
5.2.5 The Analysis of Push-based Approach 46
6. Conclusions and Future Work 48
References 49
[1] M. Avvenuti, A. Vecchio, and G. Turi, “A Cross-Layer Approach for Publish /Subscribe in Mobile Ad Hoc Networks,” in Proceedings of the 2nd International Workshop on Mobility Aware Technologies and Applications (MATA 2005), pp. 203-214, Montreal, Canada, October 2005.
[2] J. Al-Muhtadi, R. Campbell, A. Kapadia, D. Mickunas, and S. Yi, “Routing through the mist: Privacy Preserving Communication in Ubiquitous Computing Environments,” in Proceedings of the International Conference of Distributed Computing Systems (ICDCS 2002), pp. 74-83, Vienna, Austria, July 2002.
[3] R. Bai and M. Singhal, “DOA: DSR over AODV Routing for Mobile Ad Hoc Networks,” IEEE Transactions on Mobile Computing, Vol. 5, No. 10, pp. 1403-1416, October 2006.
[4] D. Bottazzi, A. Corradi, and R. Montanari, “A Context-Aware Group Management Middleware to Support Resource Sharing in MANET Environments,” in Proceedings of the 6th international conference on Mobile data management, pp. 147-151, Ayia Napa, Cyprus, May 2005.
[5] J. E. Bardram, “The Java Context-awareness Framework (JCAF)-A Service Infrastructure and Programming Framework for Context-Aware Applications,” in Proceedings of 3rd International Conference on Pervasive Computing (PERVASIVE 2005), pp. 98-115, Munich, Germany, May 2005.
[6] D. Bottazzi, A. Corradi, and R. Montanari, “Context-Aware Group Communication in Mobile Ad-Hoc Networks,” in Proceedings of the 2nd International Conference on Wired/Wireless Internet Communications (WWIC 2004), pp. 38-47, LNCS Press, Germany, January 2004.
[7] R. Beale and P. Lonsdale, “Mobile Context-Aware Systems: the Intelligence to Support Tasks and Effectively Utilize Resources,” in Proceedings of 6th International Symposium on Mobile Human-Computer Interaction (MobileHCI 2004), pp. 240-251, Glasgow, UK, September 2004.
[8] Fan Bai, Narayanan Sadagopan, and Ahmed Helmy. “IMPORTANT: A Framework to Systematically Analyze the Impact of Mobility on Performance of Routing Protocols for Ad Hoc Networks,” in Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (Infocom 2003), Vol.2, pp. 825-835, San Francisco, California, USA, April 2003.
[9] M. Benerecetti, P. Bouquet, and M. Bonifacio, “Distributed Context-Aware Systems,” in Journal of Human Computer Interaction. Special issue on Context-aware computing, Vol. 16, No. 2, 3 & 4, pp. 213-228, 2001.
[10] S. Basagni, D. Turgut, and S. K. Das, “Mobility-Adaptive Protocols for Managing Large Ad Hoc Networks,” in Proceedings of the IEEE International Conference on Communications (ICC 2001), pp. 1539-1543, Helsinki, Finland, June 2001.
[11] D. Chakraborty, A. Joshi, Y. Yesha,.and T. Finin, “Toward Distributed Service Discovery in Pervasive Computing Environments,” IEEE Transactions on Mobile Computing, Vol. 5, No. 2, pp. 97-112, February 2006.
[12] Y. Chen and K. Schwan, “Opportunistic Overlays: Efficient Content Delivery in Mobile Ad Hoc Networks,” in Proceedings of the 6th ACM/IFIP/USENIX International Middleware Conference (Middleware 2005), pp. 354-374, Grenoble, France, November 2005.
[13] H. Chen, T. Finin, and A. Joshi, “A Mobile Broker for Building Smart Meeting Rooms,” in Proceedings of the Knowledge Representation and Ontology for Autonomous Systems Symposium, 2004 AAAI Spring Symposium, pp. 116-123, Stanford CA, March 2004.
[14] A. K. Dey, “Distributed Mediation of Ambiguous Context in Aware Environments,” in Proceedings of the 15th Annual Symposium on User Interface Software and Technology (UIST 2002), pp. 121-130, Paris, France, October 2002.
[15] A. Ferscha, C. Holzmann, and S. Oppl, “Context-Awareness for Group Interaction Support,” in Proceedings of the 2nd international workshop on Mobility management & wireless access protocols, pp. 88-97, Philadelphia, PA, USA, October 2004.
[16] C. Gui and P. Mohapatra. “Efficient Overlay Multicast for Mobile Ad Hoc Networks,” in Proceedings of IEEE Wireless Communications and Networking Conference, Vol. 2, pp. 1118-1123, New Orleans, Louisiana, USA, March 2003.
[17] T. Gu, “A Service-Oriented Middleware for Building Context-Aware Services,” in Journal of Network and Computer Applications, Vol. 28, No. 1, pp. 1-18, January 2005.
[18] A. Helmy, S. Garg, N. Nahata, and P. Pamu, “CARD: A Contact-based Architecture for Resource Discovery in Wireless Ad Hoc Networks,” in Journal of Mobile Networks and Applications, Vol. 10, Issue 1-2, pp. 99-113, February 2005.
[19] Q. Huang, C. Julien, and G. -C. Roman, “Relying on Safe Distance to Achieve Strong Partitionable Group Membership in Ad Hoc Networks,” IEEE Transactions on Mobile Computing, Vol. 3, No. 2, pp. 192-205, April-June 2004.
[20] Y. Huang and H. Garcia-Molina, “Publish/Subscribe in a Mobile Environment,” in Journals of Wireless Network on Pervasive computing and communications, Vol. 10, No. 6, pp. 643-652, November 2004.
[21] C. Julien and G.-C.Roman, “EgoSpaces: Facilitating Rapid Development of Context-Aware Mobile Applications,” IEEE Transactions on Software Engineering, Vol. 32, No. 5, pp. 281-298, May 2006.
[22] D. B. Johnson and D. A. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks,” in Mobile Computing, edited by T. Imielinski and H. Korth, Chapter 5, pp. 153-181, Kluwer Publishing Company, 1996.
[23] J. Krumm and E. Horvitz, “LOCADIO: Inferring Motion and Location from Wi-Fi Signal Strengths,” in Proceedings of the 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous 2004), pp. 4-13, Boston, Massachusetts, USA, August 2004.
[24] H. Li and M. Singhal, “An Anchor-Based Routing Protocol with Cell ID Management System for Ad Hoc Networks,” in Proceedings of 14th International Conference on Computer Communications and Networks (ICCCN 2005), pp. 215-222, San Diego, USA, October 2005.
[25] M. Langheinrich, “A Privacy Awareness System for Ubiquitous Computing,” in Proceedings of the 4th international conference on Ubiquitous Computing (UbiComp 2002), pp. 237-245, Goteborg, Sweden, September 29-October 1, 2002.
[26] M. Musolesi, C. Mascolo, and S. Hailes, “Adapting Asynchronous Messaging Middleware to Ad Hoc Networking,” in Proceedings of the 2nd workshop on Middleware for pervasive and ad-hoc computing, pp. 121-126, Toronto, Ontario, Canada, October 2004.
[27] D. Mandato, E. Kovacs, F. Hohl, and H. Amir-Alikhani, “CAMP: A Context-Aware Mobile Portal,” in IEEE Communications, Vol. 40, No. 1, pp. 90-97, Jan 2002.
[28] C. E. Perkins and E. M. Royer, “Ad-Hoc On-Demand Distance Vector Routing,” in Proceedings of 2nd IEEE Workshop on Mobile Computing Systems and Applications, pp. 90-100, New Orleans, Louisiana, USA, Feb. 1999.
[29] B. Priyantha, A. Chakraborty, and H. Balakrishnan, “The Cricket Location-Support System,” in Proceedings of the 6th annual international conference on Mobile computing and networking, pp. 32-43, Massachusetts, Boston, August 2000.
[30] M. Raya, A. Aziz, and J.-P. Hubaux, “Efficient Secure Aggregation in VANETs,” in Proceedings of the 3rd international workshop on Vehicular ad hoc networks (VANET 2006), pp. 67-75, Los Angeles, California, USA, September 2006.
[31] A. Ranganathan, J. Al-Muhtadi, J. Biehl, B. Ziebart, R. Campbell, and Brian Bailey, “Towards a Pervasive Computing Benchmark,” in Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW 2005), pp. 194-198, Kauai Island, Hawaii, March 2005.
[32] B.I.J. Siljee, I.E. Bosloper, and J.A.G. Nijhuis, “A Classification Framework for Storage and Retrieval of Context,” in Proceedings of the 1st Workshop on Modeling and Retrieval of Context (MRC 2004), pp. 37-47, Ulm, Germany, September 2004.
[33] D. Salber, A. K. Dey, and G. D. Abowd, “The Context Toolkit: Aiding the Development of Context-enabled Applications,” in Proceedings of the 1999 Conference on Human Factors in Computing Systems (CHI 1999), pp. 434-441, Pittsburgh, PA, May 1999.
[34] B. Schilit, N. Adams, and R. Want, “Context-Aware Computing Applications,” in Proceedings of the Workshop on Mobile Computing Systems and Applications, pp. 85-90, Santa Cruz, CA, December 1994.
[35] T. Strang and C. L.-Popien, “A Context Modeling Survey,” In Proceedings of the Sixth International Conference on Ubiquitous Computing - Workshop on Advanced Context Modeling, Reasoning and Management (UbiComp 2004), Nottingham/England, September 2004.
[36] C. Tuduce and T. Gross, “Organizing a Distributed Application in a Mobile Ad Hoc Network,” in Proceedings of 2nd IEEE International Symposium on Network Computing and Applications (NCA 2003), pp. 231-238, Cambridge, MA, USA, April 2003.
[37] B. Wang, J. Bodily, and S. K. S. Gupta, “Supporting Persistent Social Groups in Ubiquitous Computing Environments Using Context-Aware Ephemeral Group Service,” in Proceedings of the 2nd IEEE International Conference on Pervasive Computing and Communications (PerCom 2004), pp. 287-296, Orlando, Florida, U.S.A, March 2004.
[38] S. Yousefi, M.S. Mousavi, and M. Fathy, “Vehicular Ad Hoc Networks (VANETs): Challenges and Perspectives,” in Proceedings of 6th International Conference on ITS Telecommunications, pp. 761-766, Chengdu, China, June 2006.
[39] E. Yoneki and J. Bacon, “Distributed Multicast Grouping for Publish/Subscribe over Mobile Ad Hoc Networks,” in Proceedings of the 2005 IEEE Wireless Communications and Networking Conference (WCNC 2005), Vol. 4, pp. 2293-2299, New Orleans, USA, March 2005.
[40] E. Yoneki and J. Bacon, “An Adaptive Approach to Content-Based Subscription in Mobile Ad Hoc Networks,” in Proceedings of the 2nd IEEE International Conference on Pervasive Computing and Communications - Workshop on Mobile Peer-to-Peer Computing, pp. 92-97, Orlando, USA, March 2004.
[41] VINT Project, “Network Simulator version 2 (NS-2),” Technical report, http://www.isi.edu/nsnam/ns, June 2001.
[42] J. Zhao and G. Cao, “VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks,” in Proceedings of the 25th Conference on Computer Communications (IEEE INFOCOM 2006), Barcelona, Spain, April 2006.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top