跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.213) 您好!臺灣時間:2025/11/07 23:17
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:黃立行
研究生(外文):Li-Shing Huang
論文名稱:網路服務可用性之偵測與回報系統
論文名稱(外文):Detection and Reporting System for Availability of Network Services
指導教授:包蒼龍包蒼龍引用關係
指導教授(外文):Tsang-Long Pao
學位類別:碩士
校院名稱:大同大學
系所名稱:資訊工程學系(所)
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2009
畢業學年度:97
語文別:英文
論文頁數:61
中文關鍵詞:網路服務可用性
外文關鍵詞:availability of network service
相關次數:
  • 被引用被引用:2
  • 點閱點閱:302
  • 評分評分:
  • 下載下載:38
  • 收藏至我的研究室書目清單書目收藏:0
網路設備與伺服器斷線偵測回報系統是一個全時監控網路設備與伺服器是否斷線的系統。當系統偵測到斷線的狀況時,會向管理者寄發警告訊息,使得管理者能夠盡快地處理問題。本文提出五種機制,能夠有效地改善在發展網路設備與伺服器斷線偵測回報系統時,可能遭遇的數種問題。為了能夠順利偵測種類繁多的網路服務和網路設備,我們利用發出ICMP回應請求和建立TCP連線的方式作為偵測的機制,因此不必實作各種客戶端程式,亦能有效地監控各種伺服器的狀態。當網路與伺服器暫時過載或不穩定時,斷線偵測回報系統可能為將正常的伺服器誤判為斷線,並向管理者寄發警告訊息,我們利用Two-way De-bouncing偵測機制,有效地降低了誤判的機會。將機器斷線的警告訊息透過行動電話簡訊發送給管理者,是一種有效率但會產生額外費用的方式,我們利用Message Pool機制,使系統先將警告訊息合併之後才送出,有效地減少了發出的簡訊總量。當被監控的機器或是沒有回應的機器數量過於龐大時,斷線偵測系統必須花費很長的時間才能完成一次對於所有機器的偵測作業,我們利用平行偵測機制,讓斷線偵測系統同時偵測多部機器,有效地縮短了每一輪偵測作業所花費的時間。斷線偵測系統本身及其所在機房的網路和電力環境也都有可能發生問題,我們利用遠端備援機制,使得斷線偵測系統在較極端的狀況發生時,例如:整個機房停電,仍然能夠發揮偵測以及示警的功能。
In this thesis, we propose five mechanisms to solve the problems that we encountered when we developed the network service availability detection system in Ming Chuan University. For effectively detecting various kinds of network services, we use ICMP echo request and TCP socket as the detection mechanism. For accurately determining the availability of network services, we use a two-way de-bouncing availability determination mechanism to improve the accuracy of the availability detection. To save the cost of sending alert messages through mobile phone systems, we use a message pool mechanism to reduce the amount of alert messages without affecting the function of notifying the administrator of unavailable network services. To improve the poor performance caused by a long list of monitored machines for unavailable network services, we use a parallel detection mechanism which loads multiple detection processes simultaneously. For enhancing the availability of the network service availability detection system itself, we use a cross campus failover configuration to keep the detection system available when extreme situations occur.
誌謝 i
ABSTRACT ii
中文摘要 iii
TABLE OF CONTENTS iv
LIST OF FIGURES vi
LIST OF TABLES viii
CHAPTER 1 INTRODUCTION 1
1.1 Introduction 1
1.2 Motivation and Objective 3
1.3 Thesis Organization 6
CHAPTER 2 BACKGROUND 7
2.1 Agent-Based Network Management 7
2.1.1 SNMP 7
2.2 Agent-Free Fault Monitoring 9
2.2.1 ICMP Echo Request 10
2.2.2 Client Programs for Application Layer Protocols 13
2.2.3 TCP Connection 15
2.2 Availability Determination Mechanisms 16
2.2.1 Directly Detect and Report Mechanism 16
2.2.2 Modified detection and reporting mechanism 16
2.2.3 De-bouncing Availability Determination Mechanism 18
2.3 Location of the Detection System 19
2.4 SMS Message Sending Techniques 22
2.4.1 GSM/GPRS Modem 23
2.4.2 SMS Gateway 24
CHAPTER 3 SYSTEM DESIGN 27
3.1 Overview 27
3.2 Network Service Availability Detection 28
3.3 Two-way De-bouncing Availability Detection Mechanism 32
3.4 Message Pool Mechanism 35
3.5 Parallel Detection Mechanism 36
CHAPTER 4 SYSTEM IMPLEMENTATION 39
4.1 Platform 39
4.2 Network Configurations 40
4.3 System Implementation 41
4.4 User Interface 46
CHAPTER 5 CONCLUSIONS AND FUTURE WORKS 49
REFERENCE 50
[1]戴江淮、賴正延、姜玲鳳,"網路斷線自動警報系統," TANET 2004, 2004, pp. 371-375.
[2]包蒼龍、陳建伯、黃立行,"改良之網路及伺服器服務斷線偵測回報機制," TANET 2007, 2007.
[3]W. Stallings, SNMP, SNMPv2, SNMPv3, and RMON 1 and 2. Addison Wesley Longman, Inc., 1999.
[4]Cisco Systems, Internetworking Technologies Handbook, 4th ed. Cisco Press, 2003.
[5]K. McCloghrie and M. Rose, "Management Information Base for Network Management of TCP/IP-based internets: MIB-II," RFC 1213, Mar. 1991.
[6]Net-SNMP. [Online]. http://www.net-snmp.org/docs/man/snmpwalk.html
[7]S. F. Midkiff and H. E. Hia, "Securing SNMP across backbone networks," in Computer Communications and Networks, 2001. Proceedings. Tenth International Conference on, 2001, pp. 190-196.
[8]D. E. Comer, Internetworking With TCP/IP Vol I: Principles, Protocols, and Architecture, 3rd ed. Prentice-Hall, 1995.
[9]G. Lyon. (1997) The Art of Port Scanning. [Online]. http://nmap.org/nmap_doc.html
[10]J. Postel, "Internet Control Message Protocol," RFC 792, Sep. 1981.
[11]R. W. Stevens, TCP/IP Illustrated, Volume 1: The Protocols. Addison-Wesley, 1994.
[12]賴守全、郭文曲,"以應用層為基礎之網路品質測量,"TANET 2006, 2006.
[13]HTTP - Hypertext Transfer Protocol. [Online]. http://www.w3.org/Protocols/
[14]J. Myers and M. Rose, "Post Office Protocol - Version 3," RFC 1939, May 1996.
[15]PHP Manual. [Online]. http://www.php.net/manual/
[16]Computer Center of Ministry of Education. [Online]. http://www.edu.tw/MOECC/
[17]TWSMS. [Online]. http://www.twsms.com
[18]Taiwan Mobile. [Online]. http://www.taiwanmobile.com
[19]Chunghwa Telecom. [Online]. http://www.cht.com.tw
[20]FAR EASTONE. [Online]. http://www.fetnet.net
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top