Topology Analysis Model for finding Potential Victim Set in a Network
碩士 === 國立交通大學 === 電控工程研究所 === 101 === In recent years, with the rapid development of Internet, the network service quality and performance bottlenecks are the greatest concern for network clients and service providers. When planning and provisioning a network, a mobile network service provider needs...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2013
|
Online Access: | http://ndltd.ncl.edu.tw/handle/93338973543739372300 |
id |
ndltd-TW-101NCTU5449118 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-101NCTU54491182016-07-02T04:20:30Z http://ndltd.ncl.edu.tw/handle/93338973543739372300 Topology Analysis Model for finding Potential Victim Set in a Network 針對網路拓樸圖進行潛在關鍵節點的分析研究 Yeh,Shu-Hong 葉書宏 碩士 國立交通大學 電控工程研究所 101 In recent years, with the rapid development of Internet, the network service quality and performance bottlenecks are the greatest concern for network clients and service providers. When planning and provisioning a network, a mobile network service provider needs a tool that can accurately analyze the dynamics topology of a wireless or mobile network. Therefore, in this thesis, we design an approach to identify vulnerable network nodes, defined as potential victim nodes and realize the approach in our network topology exploring system, which is composed of an analyzer (JTracert) running on the PC side and several mobile clients (ProbeCollector) running on mobile devices. We use the U.S. Berkeley DETERLab network testbed to verify our approach. We conduct several experiments to evaluate the accuracy of the proposed approach. From the experimental results, the higher accuracy we can obtain the number of endpoints we provide to the topology exploring system. More, we can obtain better accuracy if fewer nodes are hidden (invisible) during the exploration. Huang,Yu-Lun 黃育綸 2013 學位論文 ; thesis 41 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立交通大學 === 電控工程研究所 === 101 === In recent years, with the rapid development of Internet, the network service quality and performance bottlenecks are the greatest concern for network clients and service providers.
When planning and provisioning a network, a mobile network service provider needs a tool that can accurately analyze the dynamics topology of a wireless or mobile network.
Therefore, in this thesis, we design an approach to identify vulnerable network nodes, defined as potential victim nodes and realize the approach in our network topology exploring system, which is composed of an analyzer (JTracert) running on the PC side and several mobile clients (ProbeCollector) running on mobile devices.
We use the U.S. Berkeley DETERLab network testbed to verify our approach.
We conduct several experiments to evaluate the accuracy of the proposed approach. From the experimental results, the higher accuracy we can obtain the number of endpoints we provide to the topology exploring system.
More, we can obtain better accuracy if fewer nodes are hidden (invisible) during the exploration.
|
author2 |
Huang,Yu-Lun |
author_facet |
Huang,Yu-Lun Yeh,Shu-Hong 葉書宏 |
author |
Yeh,Shu-Hong 葉書宏 |
spellingShingle |
Yeh,Shu-Hong 葉書宏 Topology Analysis Model for finding Potential Victim Set in a Network |
author_sort |
Yeh,Shu-Hong |
title |
Topology Analysis Model for finding Potential Victim Set in a Network |
title_short |
Topology Analysis Model for finding Potential Victim Set in a Network |
title_full |
Topology Analysis Model for finding Potential Victim Set in a Network |
title_fullStr |
Topology Analysis Model for finding Potential Victim Set in a Network |
title_full_unstemmed |
Topology Analysis Model for finding Potential Victim Set in a Network |
title_sort |
topology analysis model for finding potential victim set in a network |
publishDate |
2013 |
url |
http://ndltd.ncl.edu.tw/handle/93338973543739372300 |
work_keys_str_mv |
AT yehshuhong topologyanalysismodelforfindingpotentialvictimsetinanetwork AT yèshūhóng topologyanalysismodelforfindingpotentialvictimsetinanetwork AT yehshuhong zhēnduìwǎnglùtàpǔtújìnxíngqiánzàiguānjiànjiédiǎndefēnxīyánjiū AT yèshūhóng zhēnduìwǎnglùtàpǔtújìnxíngqiánzàiguānjiànjiédiǎndefēnxīyánjiū |
_version_ |
1718331555941711872 |