Topology Analysis Model for finding Potential Victim Set in a Network

碩士 === 國立交通大學 === 電控工程研究所 === 101 === In recent years, with the rapid development of Internet, the network service quality and performance bottlenecks are the greatest concern for network clients and service providers. When planning and provisioning a network, a mobile network service provider needs...

Full description

Bibliographic Details
Main Authors: Yeh,Shu-Hong, 葉書宏
Other Authors: Huang,Yu-Lun
Format: Others
Language:zh-TW
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/93338973543739372300
Description
Summary:碩士 === 國立交通大學 === 電控工程研究所 === 101 === In recent years, with the rapid development of Internet, the network service quality and performance bottlenecks are the greatest concern for network clients and service providers. When planning and provisioning a network, a mobile network service provider needs a tool that can accurately analyze the dynamics topology of a wireless or mobile network. Therefore, in this thesis, we design an approach to identify vulnerable network nodes, defined as potential victim nodes and realize the approach in our network topology exploring system, which is composed of an analyzer (JTracert) running on the PC side and several mobile clients (ProbeCollector) running on mobile devices. We use the U.S. Berkeley DETERLab network testbed to verify our approach. We conduct several experiments to evaluate the accuracy of the proposed approach. From the experimental results, the higher accuracy we can obtain the number of endpoints we provide to the topology exploring system. More, we can obtain better accuracy if fewer nodes are hidden (invisible) during the exploration.