博碩士論文 92523033 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:28 、訪客IP:54.210.158.163
姓名 蘇皇文(Huang-Wen Sue)  查詢紙本館藏   畢業系所 通訊工程學系
論文名稱 分波多工網際網路之跨層保護技術研究
(A Study of Cross Layers Protection Scheme in IP over WDM Networks)
相關論文
★ 應用MSPP至DWDM都會光纖網路的設計★ 光網路與WiMAX整合架構研究及其簡化雛型實驗
★ 以Linux系統為基礎之NAT效能優化研究及其實作★ 光波長劃分多工網路之路徑保護機制研究
★ 標籤交換網路下具有服務品質路由安排之研究★ 以訊務相關性為基礎的整合性服務可調整QoS排程器之研究
★ 以群體播送支援IPv6環境下移動式網路連結更新之研究★ 無線區域網路資源動態分配之效能研究
★ 在微觀移動環境下有效資源保留之路徑管理研究★ 無線網路交握程序之預先認證方法分析與比較
★ 無線區域網路虛擬允入控制之研究★ IPv6環境下移動網路之連結更新程序及其效能之研究
★ 具有限數量波長轉換節點的分波多工網路之群播波長分配與容量計算研究★ 階層化行動式IPv6移動錨點選擇機制研究
★ 具高能量移動節點之叢集式感測網路 效能研究★ 預先註冊之快速換手階層化行動式IPv6研究
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 由於網際網路技術的迅速發展,使得使用者流量迅速成長,因此網路
的存活性問題是現今網際網路最重要的問題之ㄧ,在此篇論文中,我們在
分波多工網際網路中藉由數種不同的保護機制來探討這個問題。在通用多
重協定標籤交換技術中,一條標籤交換路徑的保護不外乎是依序式的保護
機制和整合式的保護機制兩種。在依序式的保護機制中,標籤交換路徑的
保護不外乎是MPLS 層和光層兩種。在MPLS 層中的保護,工作路徑的標籤
交換路徑是經由其來源端至目的端之任一鏈路不重疊之備用標籤交換路
徑所保護;在光層中的保護,工作路徑的標籤交換路徑是經由其來源端至
目的端之任一鏈路不重疊之備用光路徑所保護。而整合式的保護機制,是
整合多層的方式,不侷限於任何一層而較有效的利用資源,進而達到保護
的效果。
爲了達到資源最佳化的效果且減少工作路徑之光電轉換次數,在此篇
論文中,我們除了考慮共用風險鏈路群組觀念外,且藉由引入負載平衡的
觀念和光電轉換參數的路由成本考量,而提出之基於跳躍數和頻寬的整合
式路由演算法(HB-IRA),進而達到改善網路資源利用率和盡量減少路由成
本的目標,最後,我們經由比較各種保護機制方式之連線請求阻塞率和光
電轉換次數的模擬,證明出我們所提出之方法達到較好的效能。
摘要(英) Due to the explosive growth of user traffic driven by the Internet technology,
network survivability has become one of the important issues of
internet.deployment. In this thesis, we investigate various kinds of protection
approaches in IP/MPLS-over-WDM networks. In GMPLS (Generalized
Multi-Protocol Label Switching), an LSP (Label Switch Path) can be protected
at either the sequential-routing approach or the integrated-routing approach. In
sequential-routing approach, an LSP (LSR) can be protected at either the
IP/MPLS layer protection or the optical layer. In IP/MPLS layer protection, an
LSP is protected by providing a link-disjoint backup LSP between its end nodes.
In optical layer protection, an LSP is protected by the backup lightpath between its
end nodes. In integrated-routing approach, an LSP is protected by presenting a
multilayer protection scheme for multiclass traffic in IP/MPLS over WDM
networks.
In order to optimize the network resources and to reduce the number of
optical –electrical –optical (o-e-o) conversions, we present an integrated
routing algorithm : hop-based and bandwidth-based routing algorithm
(HB-IRA). In addition to considering SRLG (Shared Risk Link Group) concept,
we indicate that using the load balance and o-e-o parameter can improve
network utilization and decrease path cost.. The connection blocking
probability and number optical-electrical-optical conversions are used as
performance metrics for simulations. Simulation results show that our approach
surpass to that of other lightpath protection schemes.
關鍵字(中) ★ 整合式路由
★ 分波多工
關鍵字(英) ★ Integrated-routing
★ WDM
論文目次 第一章 緒論............................................................................................. 1
1.1 前言………………………………………………………. 1
1.2 研究動機…………………………………………………. 2
1.3 論文架構…………………………………………………. 3
第二章 光網路相關文獻………………………………………………. 4
2.1 光網路之簡介及其發展…………………………………. 4
2.1.1 光網路的發展……………………………………. 4
2.1.2 分波多工/高密集分波多工(WDM/DWDM)通訊
系統………………………………………………. 5
2.1.3 WDM/DWDM 通訊網路系統之相關設備……… 6
2.1.4 通用多重協定標籤交換技術(GMPLS)………….. 8
2.1.5 光路徑(lightpath) 12
2.1.6 路由與波長分配(RWA)………………………….. 13
2.2 IP/MPLS Over WDM 的網路生存性……………………. 14
2.2.1 保護機制與恢復機制之基本理論………………. 15
2.2.2 共用風險鏈路群組(SRLG : Shared Risk Link
Group)…………………………………………….. 17
2 . 2 . 3 多層網路的恢復機制……………………………. 22
2 . 2 . 4 多層網路的保護機制……………………………. 25
2 . 2 . 5 IP/WDM 網路跨層保護機制……………………. 27
第三章 系統架構………………………………………………………. 30
3.1 系統架構…………………………………………………. 30
3.1.1 實體分段可用波長數…………………………….. 30
3.1.2 共用風險鏈路群組(SRLG : Shared Risk Link
Group)與可共享備用頻寬(Sharable backup
capacity)之計算…………………………………… 32
3.1.3 光電轉換節點選取多寡次數問題……………….. 33
3.2 基於跳躍數與頻寬為考量之跨層保護技術(Hop-based
and Bandwidth-based Cross Layers Protection Scheme).. 33
3.2.1 基於跳躍數與頻寬為考量的整合式路由演算法
(HB-IRA)………………………………………….. 34
3.2.2 資源釋放(Release resource)………………………. 36
第四章 模擬環境與結果分析…………………………………………. 39
4.1 模擬環境與假設說明……………………………………. 39
4.2 模擬結果分析……………………………………………. 40
4.2.1 模擬一:分析控制參數k 值與連線請求阻塞率的
關係……………………………………………….. 41
4.2.2 模擬二:分析光電轉換o/e 值與主要路徑平均光電轉
換次數和連線請求阻塞率的關係……………………. 43
4.2.3 模擬三:動態拓樸(Dynamic topology)資源釋放跟靜態
拓樸 (Static topology)資源釋放之阻塞率比較與拆除/
建構邏輯鏈路總數狀態比較…………………………. 46
4.2.4
模擬四:四種不同路由演算法之阻塞率與主要路徑光
電轉換次數探討………………………………………. 50
4.2.5 模擬五:不同之LSR 節點選取時模擬結果分析 57
第五章 結論與未來研究………………………………………………. 62
參考文獻 …………………………………………………………….. 64
參考文獻 [1] Walter Goralski, “Optical Networking & WDM”, McGraw-Hill, 2001.
[2]B.M ukherjee, “WDM optical networks: progress and challenges,” IEEE
Journal on Selected Areas in Communications, vol.18, no.10, Oct. 2000, pp.
1810-1824.
[3] R. Ramaswami and G. Sasaki, “Multiwavelength Optical Networks with
Limited Wavelength Conversion,” IEEE Transactions on Network, vol. 6,
no. 6, Dec. 1998, pp. 744-754.
[4] Dider Colle, Sophie De Maesschalck, Chris Develder, Pim Van Heuven,
Adelbert Groebbens, Jan Cheyns, Ilse Lievens, Mario Pickavet, Paul
Lagasse, and Piet Demeester , “Data-centric optical networks and their
survivability”, IEEE Journal on Volume 20, Issue 1, Jan. 2002 , pp.6 -
20.
[5] S. Ramamurthy, B. Mukherjee, “Survivable WDM mesh
networks. II. Protection”, Communications, 1999. ICC '99. 1999 IEEE
International Conference on Volume 3, 6-10 June 1999, pp744-751 .
[6] S. Ramamurthy, B. Mukherjee, “Survivable WDM mesh
networks. II. Restoration”, Communications, 1999. ICC '99. 1999 IEEE
International Conference on Volume 3, 6-10 June 1999 , pp.2023 - 2030
[7] Pin-Han Ho, Mouftah, H.T., ”Shared Protection in Mesh WDM Networks”
Communications Magazine, IEEE Volume 42, Issue 1, Jan 2004,
pp. 70 – 76.
[8] Dahai Xu, Student Member, IEEE, Yizhi Xiong, Associate Member, IEEE,
Chunming Qiao, Member, IEEE, and Guangzhi Li, IEEE,” Trap Avoidance
and Protection Schemes in Networks With Shared Risk Link
Groups”, Lightwave Technology, Journal of Volume 21, Issue 11, Nov.
2003, pp. 2683 – 2693.
[9] Dahai Xu, Yizhi Xiong, and Chunming Qiao, State University of New York
at Buffalo, Guangzhi Li, AT&T Research Lab, ”Failure Protection in
Layered Networks with Shared Risk Link Groups”, IEEE Volume
18, Issue 3, May-June 2004, pp.36 – 41.
[10]Hassan Naser, Member, IEEE ,and Hussein T. Mouftah, Fellow, IEEE , ”A
Multilayer Differentiated Protection Services Architecture”, IEEE Journal
on Selected Areas in Communications, Vol. 22,No. 8.,October 2004,
pp1539-1547
[11]Yang Qin, Lorne Mason, and Ke Jia, Nanyang Technological
University, ”Study on a Joint Multiple Layer Restoration Scheme for IP
over WDM Network”, IEEE Volume 17, Issue 2, March-April 2003,
pp.43 – 48.
[12]Y. Ye,C. Assi,S. Dixit,and M. A. Ali,” A Simple Dynamic Integrated
Provisioning / Protection Scheme in IP over WDM Networks.”, IEEE
Communication Magazine, November 201, pp. 174-182.
[13]Q. Zheng and G. Mohan,”An efficient Dynamic Protection Scheme in
Integrated IP/WDM Networks,” Proc. ICC May 2003, IEEE International
Conference on Volume 2, 11-15 May 2003 , pp.1494 - 1498 .
[14]Qin Zheng and Gurusamy Mohan,”Protection Approaches For Dynamic
Traffic in IP/MPLS-over-WDM Networks”, Communications Magazine,
IEEE Volume 41, Issue 5, May 2003, pp.24 - 29.
[15]Elio Salvadori , Roberto Battiti, ”Quality of Service in IP over WDM:
considering both service differentiation and transmission quality”,
Communications, 2004 IEEE International Conference on Volume
3, 20-24 June 2004, pp.1836 - 1840 .
[16] Jinwook Burm , Kerry I. Litvin ,William J. Schaff, and Lester F. Eastman.
“Optimization of High-Speed Metal-Semiconductor-Metal
Photodetectors.” IEEE Volume 6, Issue 6, June 1994, pp.722 - 724.
[17] K . Zhu ,H . Zang, B . Mukherjee, ”A Comprehensive Study on
Next-Generation Optical Grooming Switches ”,IEEE Journal on Selected
Areas in Communications, vol.21, no.7, Sep. 2003, pp.1173-1186
[18]Y. Zhu, G. N. Rouskas , and H. G. Perros, ”A Comparison of Allocation
Policies in Wavelength Routing Networks,” Photonic Network
Communications Journal, Vol.2,No. 3, Aug.2000, pp 265-293.
指導教授 陳彥文(Yen-Wen Chen) 審核日期 2005-7-20
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明