請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/52359
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 周俊廷(Chun-Ting Chou) | |
dc.contributor.author | Shao-An Lin | en |
dc.contributor.author | 林劭安 | zh_TW |
dc.date.accessioned | 2021-06-15T16:12:45Z | - |
dc.date.available | 2015-08-20 | |
dc.date.copyright | 2015-08-20 | |
dc.date.issued | 2015 | |
dc.date.submitted | 2015-08-18 | |
dc.identifier.citation | [1] B. Williams and T. Camp, “Comparison of broadcasting techniques for mobile ad hoc networks,” in Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 194–205, 2002.
[2] D. Koutsonikolas, Y. Hu, and C.-C. Wang, “Pacifier: High-throughput, reli- able multicast without ”crying babies” in wireless mesh networks,” IEEE/ACM Transactions on Networking, vol. 20, no. 5, pp. 1375–1388, 2012. [3] X. Tan, H. Yue, Y. Fang, and W. Cheng, “Greedy strategy for network coding based reliable broadcast in wireless mesh networks,” in IEEE Global Communi- cations Conference, pp. 5627–5632, 2012. [4] W. Lou and J. Wu, “Double-covered broadcast (dcb): a simple reliable broad- cast algorithm in manets,” in Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 2084–2095, 2004. [5] Y. Peng, W. Song, R. Huang, M. Xu, B. Shirazi, R. LaHusen, and G. Pei, “Cacades: A reliable dissemination protocol for data collection sensor network,” in IEEE Aerospace conference, pp. 1–10, 2009. [6] G. Ding, Z. Sahinoglu, B. Bhargava, P. Orlik, and J. Zhang, “Reliable broad- cast in zigbee networks,” in Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005. 2005 Second Annual IEEE Communications Society Conference on, pp. 510–520, Sept 2005. [7] G. Ding, Z. Sahinoglu, P. Orlik, J. Zhang, and B. Bhargava, “Tree-based data broadcast in ieee 802.15.4 and zigbee networks,” Mobile Computing, IEEE Trans- actions on, vol. 5, pp. 1561–1574, Nov 2006. [8] C. Wang, K. Sohraby, B. Li, M. Daneshmand, and Y. Hu, “A survey of transport protocols for wireless sensor networks,” Network, IEEE, vol. 20, pp. 34–40, May 2006. [9] O. Akan and I. Akyildiz, “Event-to-sink reliable transport in wireless sensor networks,” Networking, IEEE/ACM Transactions on, vol. 13, pp. 1003–1016, Oct 2005. [10] F. Stann and J. Heidemann, “Rmst: reliable data transport in sensor networks,” in Sensor Network Protocols and Applications, 2003. Proceedings of the First IEEE. 2003 IEEE International Workshop on, pp. 102–112, May 2003. [11] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” in Sensor Network Protocols and Applications, 2003. Pro- ceedings of the First IEEE. 2003 IEEE International Workshop on, pp. 113–127, May 2003. [12] W. Lou, “An efficient n-to-1 multipath routing protocol in wireless sensor net- works,” in Mobile Adhoc and Sensor Systems Conference, 2005. IEEE Interna- tional Conference on, pp. 8 pp.–672, Nov 2005. [13] G. Kumar, P. Rani, and C. Kumar, “Reliable-aodv,” in Computer and Communi- cation Technology (ICCCT), 2011 2nd International Conference on, pp. 568–573, Sept 2011. [14] S. Y. Shin, J.-S. Kang, and H. S. Park, “Packet error rate analysis of zigbee un- der interferences of multiple bluetooth piconets,” in Vehicular Technology Con- ference, 2009. VTC Spring 2009. IEEE 69th, pp. 1–5, April 2009. [15] G. Yang and Y. Yu, “Zigbee networks performance under wlan 802.11b/g in- terference,” in Wireless Pervasive Computing, 2009. ISWPC 2009. 4th Interna- tional Symposium on, pp. 1–4, Feb 2009. [16] H. Lim and C. Kim, “Flooding in wireless ad hoc networks,” Comput. Commun., vol. 24, pp. 353–363, Feb 2001. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/52359 | - |
dc.description.abstract | 近年來,機器對機器 (Machine to Machine, M2M)這個新的科技概念開始被廣泛地討論。M2M指的是機器或裝置間的資料交換,有了M2M的技術,我們能藉由眾多的裝置來監控環境、收集數據並透過有線或無線的網路將資料傳送到雲端,而我們便能利用這些有用的資訊做更好的決策。
許多新的科技應用,例如家庭自動化、遠端健康照顧、智慧交通系統及智慧大樓管理等,都仰賴M2M網路的技術。總體來說,M2M網路都含有為數眾多的機器或裝置,由上百、甚至上千個裝置組成多點跳躍網路(multi-hop network),如何將資訊在如此巨型的網路中傳遞,並又得同時考慮到數據的可靠性以及時效性,是一個艱巨的考驗。 在這篇論文中,我們研究所謂的一對多資料傳播(one-to-many data dissemination)以及多對一資料收集(many-to-one data collection),並提出高可靠度的通訊協定。首先,藉由確保一個裝置的所有鄰居都能正確地收到廣播中的訊框(broadcasted frame),我們可以達到100%可靠的資料傳播。在資料收集方面,我們並不讓裝置透過最短路徑回傳資料,而是讓資料透過可靠的點對點路徑(end-to-end route)回傳,也因此提升了資料收集的可靠度。 為了證實所提出的協定能夠應用在真實的環境中,我們在臺灣大學博裡館建構了一個包含106個IEEE 802.15.4無線裝置的測試平台,實驗結果顯示我們的方法能夠達到可靠度100%的資料傳播以及超過97%的資料收集。 | zh_TW |
dc.description.abstract | Machine to machine (M2M) communication, which is defined as the communica- tion between machines or devices, has been widely discussed in the past few years. With M2M technologies, machines can monitor the environment, collect data and send information through wired or wireless networks to the cloud. The information can then be translated into useful knowledge for better action taking and decision making.
Many applications such as home automation, remote health care, intelligent trans- portation System (ITS) and Building Management rely on M2M networks. In general, these M2M networks are large-scale, multi-hop networks that contain hundreds or even thousands of machines. How to disseminate data through such a huge network in a reliable and time-efficient manner is a real challenge. In this thesis, we focus on the so-called one-to-many data dissemination and many-to-one data collection. First, by ensuring that all the neighbors of a device successfully receiving the broadcasted frame, it is able to provide 100% reliable data dissemination. Second, rather than se- lecting the shortest route, a device selects a reliable end-to-end route so that reliable data collection can be achieved. In order to evaluate the performance of our solution in real environments, a test- bed composed of 106 IEEE 802.15.4 nodes is developed in BL building, National Taiwan University. The experiment shows that our solution guarantees 100% data dissemination and above 97% data collection. | en |
dc.description.provenance | Made available in DSpace on 2021-06-15T16:12:45Z (GMT). No. of bitstreams: 1 ntu-104-R01942047-1.pdf: 2904085 bytes, checksum: 8131ddbd9e8d6c242ad163fc905e2873 (MD5) Previous issue date: 2015 | en |
dc.description.tableofcontents | ABSTRACT ................................... ii
LISTOFTABLES ............................... v LISTOFFIGURES .............................. vi CHAPTER1 INTRODUCTION ..................... 1 1.1 CommonPropertiesofM2MApplications . . . . . . . . . . . . . . . 2 1.1.1 LargeScale............................ 3 1.1.2 HighReliability ......................... 3 1.1.3 LowLatency........................... 4 1.1.4 LowComplexity......................... 4 1.2 ProblemStatement ........................... 4 1.3 ThesisOrganization........................... 5 CHAPTER2 RELATEDWORK..................... 6 2.1 One-to-manyDataDisseminationProtocols . . . . . . . . . . . . . . 6 2.1.1 Implicit Acknowledgement and Retry Mechanism . . . . . . . 6 2.1.2 NeighborKnowledgeBasedProtocols . . . . . . . . . . . . . 7 2.1.3 Short Summary of One-to-many Protocols . . . . . . . . . . 9 2.2 Many-to-oneDataCollectionProtocols ................ 9 2.2.1 TinyOSBeaconingProtocol .................. 10 2.2.2 N-to-1MultipathRoutingProtocol . . . . . . . . . . . . . . 10 2.2.3 ReliableAODV ......................... 11 2.3 LimitationandCommonProblems................... 11 2.4 OurSolutions .............................. 15 CHAPTER 3 RELIABLE DATA DISSEMINATION PROTOCOL 17 3.1 An Overview of Reliable Data Dissemination Protocol . . . . . . . . 18 3.2 Reliable Data Dissemination Protocol in Detail . . . . . . . . . . . . 19 3.2.1 TypeofMessagesandThePacketFormat. . . . . . . . . . . 20 3.2.2 Creation and Maintenance of a Neighbor Table . . . . . . . . 22 3.2.3 ControlMessageDissemination................. 23 3.2.4 PollandReplyMechanism ................... 25 CHAPTER 4 RELIABLE DATA COLLECTION PROTOCOL . . 27 4.1 DesignofReliableDataCollectionProtocol . . . . . . . . . . . . . . 27 4.2 An Overview of Reliable Data Collection Protocol . . . . . . . . . . 28 4.3 ReliableDataCollectionProtocolinDetail . . . . . . . . . . . . . . 30 4.3.1 TypeofMessagesandThePacketFormat. . . . . . . . . . . 30 4.3.2 Creation and Maintenance of a Neighbor Table and Next-hop Table............................... 31 4.3.3 ManagementofReportMessages................ 35 4.4 Problem Solved by Our Solution and the Limitation . . . . . . . . . 38 CHAPTER 5 SIMULATION AND EXPERIMENTAL RESULTS IN REALTEST-BED ............................. 41 5.1 SimulationResults............................ 42 5.1.1 Simulation Results of Reliable Data Dissemination Protocol . 43 5.1.2 Simulation Results of Reliable Data Collection Protocol . . . 45 5.2 ExperimentalResultsinRealTest-Bed ................ 46 5.3 Experimental Results of Reliable Data Dissemination Protocol . . . 47 5.4 Experimental Results of Reliable Data Collection Protocol . . . . . . 49 CHAPTER6 CONCLUSIONS ...................... 51 | |
dc.language.iso | en | |
dc.title | 機器對機器網路中可靠資料傳播及收集協定 | zh_TW |
dc.title | Reliable Data Collection and Dissemination in Machine-to-Machine (M2M) Networks | en |
dc.type | Thesis | |
dc.date.schoolyear | 103-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 王晉良(Chin-Liang Wang),黃仁竑(Ren-Hung Hwang),謝宏昀(Hung-Yun Hsieh) | |
dc.subject.keyword | 可靠通訊協定,多對一資料收集,一對多資料傳播,多點跳躍網路,隱性確認, | zh_TW |
dc.subject.keyword | reliable communication protocol,many-to-one data collection,one-to-many data dissemination,multi-hop network,implicit Ack, | en |
dc.relation.page | 55 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2015-08-18 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 電信工程學研究所 | zh_TW |
顯示於系所單位: | 電信工程學研究所 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-104-1.pdf 目前未授權公開取用 | 2.84 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。