博碩士論文 101522088 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:14 、訪客IP:3.137.192.3
姓名 林胤斈(Yin-Hsueh Lin)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱 在LISP協定下一個基於貝氏網路之快取生命週期決定方法
(A Bayesian Network Based Cache Lifetime Determination Scheme for Locator/ID Separation Protocol)
相關論文
★ 無線行動隨意網路上穩定品質服務路由機制之研究★ 應用多重移動式代理人之網路管理系統
★ 應用移動式代理人之網路協同防衛系統★ 鏈路狀態資訊不確定下QoS路由之研究
★ 以訊務觀察法改善光突發交換技術之路徑建立效能★ 感測網路與競局理論應用於舒適性空調之研究
★ 以搜尋樹為基礎之無線感測網路繞徑演算法★ 基於無線感測網路之行動裝置輕型定位系統
★ 多媒體導覽玩具車★ 以Smart Floor為基礎之導覽玩具車
★ 行動社群網路服務管理系統-應用於發展遲緩兒家庭★ 具位置感知之穿戴式行動廣告系統
★ 調適性車載廣播★ 車載網路上具預警能力之車輛碰撞避免機制
★ 應用於無線車載網路上之合作式交通資訊傳播機制以改善車輛擁塞★ 智慧都市中應用車載網路以改善壅塞之調適性虛擬交通號誌
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   至系統瀏覽論文 ( 永不開放)
摘要(中) 現今使用的IP Address遽增,導致開發新型網路應用程式與網路服務有著極大困難。學者們提出了Locator/ID Separation Protocol(LISP)來解決此困境。LISP協定令IP address僅剩identifier功能,使用Ingress Tunnel Router(ITR)與Egress Tunnel Router(ETR)來代替locator 功能,並採用Mapping System將locator與identifier 做映射轉換。為了避免Mapping System負擔過重,ITR 上擁有快取(cache)設備。快取生命周期的長短將會影響ITR 對Mapping System 所發出的詢問次數。因此決定一個合適的cache lifetime 會使得Mapping System 的負擔得到舒緩,並減少mapping 所耗費的時間。

  本論文在LISP 協定下,提出了基於貝氏網路之快取生命週期決定方法(BNCLD)來計算合適的cache lifetime方法。貝氏網路在處理具有不確定性的相關知識時具有相當優勢,因為貝氏網路可以經由觀測到的證據或已知的背景知識對未知或具有不確定性的狀態進行推論。BNCLD透過資料萃取模組抓取可以從網路上觀測到的資料,並將觀測資料交由運算模組。以貝氏網路為核心進行運算,最後推得出合適的cache lifetime。模擬結果顯示BNCLD 的效能比Fixed Time Method(FTM)優異。BNCLD 在average ITR delay較之使用FTM減少可達32.57%,packet loss ratio減少可達35.24%,control overhead上減少可達33.58%。
摘要(英) Due to the usage of IP addresses rises rapidly, researchers proposed Locator/ID Separation Protocol (LISP) to solve the routing scalability problem. LISP reserves the “identifier” function of IP address. LISP uses Ingress Tunnel Router (ITR) and Egress Tunnel Router (ETR) to represent the “locator” function. LISP uses mapping system to map identifier and locator. To ease the heavy burden of mapping system, ITR has the cache equipment. The value of cache lifetime will influence the times that ITR queries mapping system. Therefore, deciding an appropriate cache lifetime can reduce the load of mapping system.

A Bayesian Network Based Cache Lifetime Determination scheme (BNCLD) for LISP is proposed in this thesis. According to the observed quantities or domain knowledge, Bayesian network can solve problems under uncertainty. BNCLD uses the Information Retrieve Module (IRM) to collect parameters from the Internet. BNCLD uses Computation Module (CM) which is based on Bayesian network to infer an appropriate cache lifetime. According to simulation experimental results, BNCLD outperforms than Fixed Time Method (FTM). BNCLD has shorter average ITR delay than FTM up to 32.57%. BNCLD improves the packet loss ratio up to 35.24%. BNCLD can reduce the control overhead up to 33.58%.
關鍵字(中) ★ 定位/標識分離協議
★ 貝氏網路
★ 快取生命週期
關鍵字(英) ★ Locator/ID Separation Protocol
★ Bayesian Network
★ Cache Lifetime
論文目次 第一章 緒論 .................................................................................... 1
1.1 概要 ................................................................................................................ 1
1.2 研究動機 ........................................................................................................ 2
1.3 研究目的 ........................................................................................................ 3
1.4 論文架構 ........................................................................................................ 4
第二章 背景知識與相關研究 ........................................................ 5
2.1 定位/標識分離協議(Locator/Identifier Separation Protocol,LISP) ..... 5
2.2 貝氏網路(Bayesian Network) ................................................................ 18
2.3 相關文獻比較 .............................................................................................. 22
第三章 系統設計 .......................................................................... 25
3.1 觀測資料的選擇 .......................................................................................... 25
3.2 系統架構 ...................................................................................................... 26
3.3 使用BNCLD 後的封包傳輸流程 .............................................................. 43
第四章 模擬結果與分析 .............................................................. 48
4.1 實驗環境 ...................................................................................................... 48
4.2 實驗一:在不同的flow 數量下,不同長短 對系統的影響.. 53
4.3 實驗二:在不同的flow 數量下,destination end user 平均更換地理位置機率對系統的影響 ...................................................................................... 58
4.4 實驗三:執行時間比較 .............................................................................. 64
第五章 結論 .................................................................................. 66
參考文獻 .......................................................................................... 67
參考文獻 [1] (2013). The World in 2013: ICT Facts and Figures. Available: http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2013-e.pdf
[2] (2014). The World in 2014: ICT Facts and Figures. Available: http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2014-e.pdf
[3] M. T. M. Khan and A. Baig, "An Efficient Mapping Scheme for Locator / ID Separation Protocol," Telecommunication Networks and Applications Conference (ATNAC), pp. 1-6, 2012.
[4] Cisco Locator/ID Separation Protocol (LISP) Introduction. Available: http://www.ringline.com.tw/index.php/support/techpapers/cloud-storage-virtualization/634-cisco-locatorid-separation-protocol-lisp-.html
[5] Bayesian Network. Available: http://en.wikipedia.org/wiki/Bayesian_network
[6] D. Saucez, L. Iannone, and B. Donnet, "A First Measurement Look at The Deployment and Evolution of The Locator/ID Separation Protocol," SIGCOMM Computer Communication Review, vol. 43, pp. 37-43, 2013.
[7] F. Coras, A. Cabellos-Aparicio, and J. Domingo-Pascual, "An Analytical Model for The LISP Cache Size," NETWORKING 2012. vol. 7289, Springer Berlin Heidelberg, pp. 409-420, 2012.
[8] Smarter Than You Think - I.B.M.′s Supercomputer to Challenge ′Jeopardy!′ Champions. Available: http://www.nytimes.com/2010/06/20/magazine/20Computer-t.html?pagewanted=all&_r=2&
[9] (2014). BGP Routing Table Analysis Reports. Available: http://bgp.potaroo.net/
[10] D. Saucez, L. Iannone, O. Bonaventure, and D. Farinacci, "Designing A Deployable Internet: The Locator/Identifier Separation Protocol," IEEE Internet Computing, vol. 16, pp. 14-21, 2012.
[11] (2013). The Locator/ID Separation Protocol (LISP). Available: http://tools.ietf.org/html/rfc6830
[12] (2013). Locator/ID Separation Protocol Alternative Logical Topology (LISP+ALT). Available: http://tools.ietf.org/html/rfc6836
[13] W. Ramirez, X. Masip-Bruin, M. Yannuzzi, R. Serral-Gracia, A. Martinez, and M. S. Siddiqui, "A Survey and Taxonomy of ID/Locator Split Architectures," Computer Networks, vol. 60, pp. 13-33, 2014.
[14] (2014). LISP Mobile Node draft-meyer-lisp-mn-11. Available: http://tools.ietf.org/html/draft-meyer-lisp-mn-11
[15] L. Iannone and O. Bonaventure, "On The Cost of Caching Locator/ID Mappings," Proceedings of the 2007 ACM CoNEXT conference, New York, 2007.
[16] J. Kim, L. Iannone, and A. Feldmann, "Caching Locator/ID Mappings: An Experimental Scalability Analysis and Its Implications," Computer Networks, vol. 57, pp. 897-909, 2013.
[17] J. Kim, L. Iannone, and A. Feldmann, "A Deep Dive into The LISP Cache and What ISPs Should Know about It," NETWORKING 2011. vol. 6640, Springer Berlin Heidelberg, pp. 367-378, 2011.
[18] M. Watari, A. Tagami, and S. Ano, "Evaluating The Performance of Locator/ID Separation Based on LISP Map Cache Emulation," 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet (SAINT), pp. 296-301, 2012.
[19] X.-Q. Li, M. Zukerman, H.-C. Zhou, H.-B. Luo, F. Qiu, and H.-K. Zhang, "Time to Live of Identifier-to-Locator Mappings: with-reset or no-reset," International Journal of Communication Systems, 2012.
[20] H. Zhang, M.-K. Chen, and Y.-C. Zhu, "Evaluating The Performance on ID/Loc Mapping," IEEE Global Telecommunications Conference (GLOBECOM) 2008, pp. 1-5, 2008.
[21] S.-C. Chen, C.-J. Chang, and Y.-H. Chu, "A Fuzzy Cache Lifetime Determination Scheme for LISP Mapping Systems," 2013 International Conference on Information Networking (ICOIN), pp. 297-302, 2013.
[22] Y. Song, "Learning from Heterogeneous Data by Bayesian Networks," Faculty of Engineering and Information Technology, University of Technology, Sydney, 2014.
[23] I. Ben-Gal, "Bayesian Networks," Encyclopedia of Statistics in Quality and Reliability, John Wiley & Sons, Ltd, 2008.
[24] Welcome: Probability Theory and Bayesian Belief Bayesian Networks. Available: http://www.eecs.qmul.ac.uk/~norman/BBNs/BBNs.htm
[25] M. Chavira and A. Darwiche, "Compiling Bayesian Networks Using Variable Elimination," Proceedings of the 20th international joint conference on Artifical intelligence, Hyderabad, India, 2007.
[26] (2010). Bayisian Network. Available: http://ccckmit.wikidot.com/st:bayesnet
[27] E. Wong, M. Burny, R. B. Hansen, and S. F. Poole, "Optimizing The Diagnosis of Bone Tumors The Bone Tumor Bayesian Network," BMI260: Computational Methods for Biomedical Image Analysis and Interpretation, 2014.
[28] C. Vlek, H. Prakken, S. Renooij, and B. Verheij, "Modeling Crime Scenarios in A Bayesian Network," Proceedings of the Fourteenth International Conference on Artificial Intelligence and Law, Rome, Italy, 2013.
[29] D. Nash, D. Waters, A. Buldu, Y.-M. Wu, Y.-P. Lin, W.-Q. Yang, Y.-Z. Song, J.-H. Shu, W. Qin, and M. Hannah, "Using A Conceptual Bayesian Network to Investigate Environmental Management of Vegetable Production in The Lake Taihu Region of China," Environmental Modelling & Software, vol. 46, pp. 170-181, 2013.
[30] M. Bartlett, I. Bate, J. Cussens, and D. Kazakov, "Probabilistic Instruction Cache Analysis Using Bayesian Networks," 2011 IEEE 17th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA), pp. 233-242, 2011.
[31] W. Ali, S. Sulaiman, and N. Ahmad, "Performance Improvement of Least-Recently-Used Policy in Web Proxy Cache Replacement Using Supervised Machine Learning," International Journal of Advances in Soft Computing & Its Applications, vol. 6, p. 38, 2014.
[32] (2011). Fuzzy Logic vs Probability. Available: http://scientopia.org/blogs/goodmath/2011/02/02/fuzzy-logic-vs-probability/
[33] F. Coras, L. Jakab, A. Cabellos-Aparicio, J. Domingo-Pascual, and V. Dobrota, "CoreSim: A Simulator For Evaluating Locator/ID Separation Protocol Mapping Systems," Trilogy Future Internet Summer School, 2009.
[34] H. V. Madhyastha, "An Information Plane for Internet Applications," University of Washington, 2008.
[35] (2009). Analyzing UDP usage in Internet traffic. Available: http://www.caida.org/research/traffic-analysis/tcpudpratio/
指導教授 周立德(Li-Der Chou) 審核日期 2014-8-29
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明