博碩士論文 89522046 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:9 、訪客IP:3.90.207.89
姓名 柳晁棟(Chao-Tung Liu)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱 在移動式網路環境中提供 QoS 的虛擬私有網路
(VPN with QoS Support in Mobile Environment)
相關論文
★ 無線行動隨意網路上穩定品質服務路由機制之研究★ 應用多重移動式代理人之網路管理系統
★ 應用移動式代理人之網路協同防衛系統★ 鏈路狀態資訊不確定下QoS路由之研究
★ 以訊務觀察法改善光突發交換技術之路徑建立效能★ 感測網路與競局理論應用於舒適性空調之研究
★ 以搜尋樹為基礎之無線感測網路繞徑演算法★ 基於無線感測網路之行動裝置輕型定位系統
★ 多媒體導覽玩具車★ 以Smart Floor為基礎之導覽玩具車
★ 行動社群網路服務管理系統-應用於發展遲緩兒家庭★ 具位置感知之穿戴式行動廣告系統
★ 調適性車載廣播★ 車載網路上具預警能力之車輛碰撞避免機制
★ 應用於無線車載網路上之合作式交通資訊傳播機制以改善車輛擁塞★ 智慧都市中應用車載網路以改善壅塞之調適性虛擬交通號誌
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   至系統瀏覽論文 ( 永不開放)
摘要(中) 虛擬私有網路(Virtual Private Network,簡稱 VPN)提供了企業用戶一個安全且成本低廉的網路連結環境,而隨著無線網路越來越普及,企業用戶的使用者隨時隨地地連接上網路已成為一種趨勢,接著就是如何將虛擬私有網路與移動式網路環境(Mobile Environment)做結合。除了要能夠任意且安全地存取企業網路,QoS 也是個重要的課題,在現有的 IP VPN 網路環境中,大多使用差別式服務(Differentiated Service,簡稱 DiffServ)來提供網路與網路之間的 QoS 服務,較難保證端點對端點(end-to-end)的 QoS 之 VPN 服務。
本文提出了雙層式 VPN 頻寬分配策略,將 VPN 的頻寬分成 VPN 層(VPN level)與呼叫層(Call level),VPN 層的頻寬分配保證了一群 VPN 用戶在網路中可以使用之頻寬,而呼叫層的頻寬分配則讓 VPN 內的使用者共享一個 VPN 層分配的頻寬。另外本文特別針對在 VPN 使用者 handoff 之前做有線及無線的頻寬保留,以確保 VPN 使用者可以在網路中無縫(seamless)的移動,享有一致的 QoS 服務。
由模擬結果可發現,本文所提出之雙層式 VPN 頻寬分配策略能有效地降低呼叫層服務呼叫時的阻絕率,而預先保留的機制則可使得使用者 handoff 過程時的封包遺失率降低。
摘要(英) Virtual Private Networks (VPN) support enterprises a secure and low-priced network environment. And as the wireless networks become more and more popular, more and more enterprise users can access the Internet anywhere, anytime using wireless technology. What comes after is the combination of VPN and the mobile environments. To achieve the mobile VPN environments, besides secure and on demand accessing the enterprise’s network, quality of service (QoS) is also an important issue. In IP VPN networks nowadays, differentiated service (DiffServ) is adopted to provide QoS network to network. But such scheme can’t guarantee end-to-end QoS of VPN services.
The thesis proposes a two-level VPN bandwidth allocation strategy. VPN services are classified into VPN level and Call level. Bandwidth allocation of VPN level guarantee services of a group of VPN users, and the bandwidth allocation of call level let the users share the bandwidth allocated to the VPN. Besides, the proposed strategy also reserves the bandwidth of wired links or wireless channels before a user handoffs to ensure that VPN users can receive seamless services while roaming in the networks with consistent QoS.
In the simulation results, we found that the proposed two-level VPN bandwidth allocation strategy can lower down the call blocking rate of call level services effectively, and the pre-reservation scheme can lower down the packet loss rate while users handoff.
關鍵字(中) ★ 移動式網路
★ 虛擬私有網路
★ 服務品質
關鍵字(英) ★ Quality of Service
★ Virtual Private Network
★ Mobile Network
論文目次 第一章 緒論 1
1.1 虛擬私有網路簡介 1
1.2 移動式網路簡介 3
1.3 虛擬私有網路的 QoS 問題 5
1.4 移動式網路的 QoS 的問題 6
1.5 研究動機與目的 7
1.5 論文架構 8
第二章 背景知識與相關研究 10
2.1虛擬私有網路相關研究 10
2.1.1 IPSec 協定 10
2.1.2 在虛擬私有網路中提供 QoS 的相關研究 12
2.2 在移動式網路環境中提供 QoS 的相關研究 13
2.3 在移動式網路環境中提供虛擬私有網路服務的相關研究 14
第三章 網路模型與架構 17
3.1 網路環境 17
3.2 模型與假設 18
3.3 移動式網路中的虛擬私有網路架構 18
第四章 所提出之 QoS 策略 23
4.1 建立一提供 QoS 服務之 VPN 流程 24
4.2 Signaling 流程 38
第五章 模擬結果與討論 45
5.1 模擬環境說明 45
5.2 模擬結果與討論 49
第六章 結論 57
參考文獻 [1] B. Gleeson, A. Lin, J. Heinanen, G. Armitage and A. Malis, “A Framework for IP Based Virtual Private Networks,” http://www.ietf.org/rfc/rfc2764.txt. Feb. 2000.
[2] 林宸堂, 李逸元, 杜唯元, 曾建豪, “電子商務的網路建設 – 淺談VPN,” http://www.iii.org.tw/ncl/document/VPN-2.htm.
[3] C. Perkins, “IP Mobility Support, ” http://www.ietf.org/rfc/rfc2002.txt. Oct 1996.
[4] E. Gustafsson, A. Jonsson and C. E. Perkins, “Mobile IPv4 Regional Registration,”http://www.ietf.org/internet-drafts/draft-ietf-mobileip-reg-tunnel-06.txt. March 2002.
[5] C. E. Perkins, “Mobile Networking Through Mobile IP,” http:// www.computer.org/internet/v2n /perkins.htm.
[6] C. Perkins, “IP Encapsulation within IP,” http://www.ietf.org/rfc/rfc2003.txt. Oct. 1996.
[7] B. Fox and B. Gleeson, “Virtual Private Networks Identifier,” http://www.ietf.org/rfc/rfc2685. Sep. 1999.
[8] W. Townsley, A. Valencia, A. Rubens, G. Pall, G. Zorn and B. Palter, “Layer Two Tunneling Protocol〝L2TP〞,” http://www.ietf.org/rfc/rfc2661.txt. Aug. 1999.
[9] S. Kent and R. Atkinson, “Security Architecture for the Internet Protocol,” http://www.ietf.org/rfc/rfc2401.txt. Nov. 1998.
[10] S. Kent and R. Atkinson, “IP Authentication Header,” http:// www.ietf.org/rfc/rfc2402.txt. Nov. 1998.
[11] S. Kent and R. Atkinson, “IP Encapsulating Security Payload (ESP),” http://www.ietf.org/rfc/rfc2406.txt. Nov. 1998.
[12] D. Harkins and D. Carrel, “The Internet Key Exchange (IKE),” http:// www.ietf.org/rfc/rfc2409.txt. Nov. 1998.
[13] J. Manner, A. L. Toledo, A. Mihailovic, H. L. V. Munoz, E. Hepworth and Y. Khouaja, “Evaluation of mobility and quality of service interaction,” ELSEVIER Computer Networks, vol. 38, pp.137-163, Feb. 2002.
[14] K. Kim and S. H. Kim, “Domain Based Approach for QoS Provisioning in Mobile IP, ” Proceeding of Global Telecommunications Conference (GLOBECOM ’’01 ), San Antonio, TX, USA , vol 4, pp.2230-2234, 2001.
[15] L. Berger and T. O’Malley, “RSVP Extensions for IPSEC Data Flows, ” http://www.ietf.org/rfc/rfc2207.txt, Sep. 1997.
[16] L. K. Lim, J. Gao, T. S. Eugene Ng, P. R. Chandra, P. Steenkiste and H. Zhang, “Customizable virtual private network service with QoS, ” ELSEVIER Computer Networks, vol. 36, pp.137-151, July. 2001.
[17] I. Khalil and T. Braun, “Edge Provisioning and Fairness in VPN-Diffserv Networks, “ Proceedings of 9th International Conference on Computer Communications and Networks, (ICCCN 2000), Las Vegas, USA, pp.424-431, Oct. 2000.
[18] A. Terzis, J. Krawczyk, J. Wroclawski and L. Zhang, “RSVP Operation Over IP Tunnels, “ http://www.ietf.org/rfc/rfc2746.txt. Jan. 2000.
[19] A. Terzis, M. Srivastava and Z. Lixia, “A simple QoS signaling protocol for Mobile Hosts in the integrated services Internet,” Proceeding of the IEEE INFOCOM ’99, NY, vol. 3, pp.1011-1018, March 1999.
[20] A. K. Talukdar, B. R. Badrinath and A. Acharya, “MRSVP: A Resource Reservation for an Integrated Services Network with Mobile Hosts, ” Wireless Networks, Vol. 7, No. 1, 2001.
[21] G.. Le Grand, E. Horlait, “A Predictive end-to-end QoS scheme in a mobile environment,” Proceedings of 6th IEEE Symposium on Computers and Communications, pp.534-539, July. 2001.
[22] 吳松霖, “Two-Layer Dynamic Bandwidth Allocation for Virtual Private Networks, “ July 1999.
[23] J. K. Zao and M. Condell, “Use of IPSec in Mobile IP,” http://www.ietf.org/proceedings/99mar/I-D/draft-ietf-mobileip-ipsec-use-00.txt. Nov. 1997.
[24] J. Binkley and J. Richardson, “Security considerations for Mobility and Firewalls,” http://www.cs.pdx.edu/research/SMN/papers/mobifirewall.txt, Nov. 1998.
[25] M. Danzeisen and T. Braun, “Secure Mobile IP Communication,” Proceedings of 26th Annual IEEE Conference on Local Computer Networks, Tempa, FL, Nov. 2001.
[26] J. R. Moorman and J. W. Lockwood, “Implementation of the Multiclass Priority Fair Queuing (MPFQ) Algorithm for Extending Quality of Service in Existing Backbones to Wireless Endpoints, “ IEEE Globecom’99, Rio De Janeiro, Brazil, pp.2752-2757, December, 1999.
[27] The Network Simulator - NS 2, http://www.isi.edu/nsnam/ns.
[28] K. Fall and K. Varadhan, The ns Manual, http://www.isi/edu/nanam/ns, April 2002.
指導教授 周立德(Li-Der Chou) 審核日期 2002-7-20
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明