Topology Analysis Model for finding Potential Victim Set in a Network

碩士 === 國立交通大學 === 電控工程研究所 === 101 === In recent years, with the rapid development of Internet, the network service quality and performance bottlenecks are the greatest concern for network clients and service providers. When planning and provisioning a network, a mobile network service provider needs...

Full description

Bibliographic Details
Main Authors: Yeh,Shu-Hong, 葉書宏
Other Authors: Huang,Yu-Lun
Format: Others
Language:zh-TW
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/93338973543739372300
id ndltd-TW-101NCTU5449118
record_format oai_dc
spelling ndltd-TW-101NCTU54491182016-07-02T04:20:30Z http://ndltd.ncl.edu.tw/handle/93338973543739372300 Topology Analysis Model for finding Potential Victim Set in a Network 針對網路拓樸圖進行潛在關鍵節點的分析研究 Yeh,Shu-Hong 葉書宏 碩士 國立交通大學 電控工程研究所 101 In recent years, with the rapid development of Internet, the network service quality and performance bottlenecks are the greatest concern for network clients and service providers. When planning and provisioning a network, a mobile network service provider needs a tool that can accurately analyze the dynamics topology of a wireless or mobile network. Therefore, in this thesis, we design an approach to identify vulnerable network nodes, defined as potential victim nodes and realize the approach in our network topology exploring system, which is composed of an analyzer (JTracert) running on the PC side and several mobile clients (ProbeCollector) running on mobile devices. We use the U.S. Berkeley DETERLab network testbed to verify our approach. We conduct several experiments to evaluate the accuracy of the proposed approach. From the experimental results, the higher accuracy we can obtain the number of endpoints we provide to the topology exploring system. More, we can obtain better accuracy if fewer nodes are hidden (invisible) during the exploration. Huang,Yu-Lun 黃育綸 2013 學位論文 ; thesis 41 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立交通大學 === 電控工程研究所 === 101 === In recent years, with the rapid development of Internet, the network service quality and performance bottlenecks are the greatest concern for network clients and service providers. When planning and provisioning a network, a mobile network service provider needs a tool that can accurately analyze the dynamics topology of a wireless or mobile network. Therefore, in this thesis, we design an approach to identify vulnerable network nodes, defined as potential victim nodes and realize the approach in our network topology exploring system, which is composed of an analyzer (JTracert) running on the PC side and several mobile clients (ProbeCollector) running on mobile devices. We use the U.S. Berkeley DETERLab network testbed to verify our approach. We conduct several experiments to evaluate the accuracy of the proposed approach. From the experimental results, the higher accuracy we can obtain the number of endpoints we provide to the topology exploring system. More, we can obtain better accuracy if fewer nodes are hidden (invisible) during the exploration.
author2 Huang,Yu-Lun
author_facet Huang,Yu-Lun
Yeh,Shu-Hong
葉書宏
author Yeh,Shu-Hong
葉書宏
spellingShingle Yeh,Shu-Hong
葉書宏
Topology Analysis Model for finding Potential Victim Set in a Network
author_sort Yeh,Shu-Hong
title Topology Analysis Model for finding Potential Victim Set in a Network
title_short Topology Analysis Model for finding Potential Victim Set in a Network
title_full Topology Analysis Model for finding Potential Victim Set in a Network
title_fullStr Topology Analysis Model for finding Potential Victim Set in a Network
title_full_unstemmed Topology Analysis Model for finding Potential Victim Set in a Network
title_sort topology analysis model for finding potential victim set in a network
publishDate 2013
url http://ndltd.ncl.edu.tw/handle/93338973543739372300
work_keys_str_mv AT yehshuhong topologyanalysismodelforfindingpotentialvictimsetinanetwork
AT yèshūhóng topologyanalysismodelforfindingpotentialvictimsetinanetwork
AT yehshuhong zhēnduìwǎnglùtàpǔtújìnxíngqiánzàiguānjiànjiédiǎndefēnxīyánjiū
AT yèshūhóng zhēnduìwǎnglùtàpǔtújìnxíngqiánzàiguānjiànjiédiǎndefēnxīyánjiū
_version_ 1718331555941711872