跳到主要內容

臺灣博碩士論文加值系統

(44.210.21.70) 您好!臺灣時間:2022/08/15 09:33
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:張天財
研究生(外文):Tian-Tsai Chang
論文名稱:基於無線區域環境下之遠端監測網管系統
論文名稱(外文):WRMON: A MONITORING SYSTEM BASED ON THE WIRELESS LOCAL LOOP
指導教授:陳俊良陳俊良引用關係
指導教授(外文):Jiann-Liang Chen
學位類別:碩士
校院名稱:國立東華大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2002
畢業學年度:90
語文別:英文
論文頁數:88
相關次數:
  • 被引用被引用:0
  • 點閱點閱:387
  • 評分評分:
  • 下載下載:102
  • 收藏至我的研究室書目清單書目收藏:0
近十年來網路已被普遍及廣泛的運用。這些年來,網路技術嚴然成為分散式計算的核心,並延伸桌上型電腦、伺服器和骨幹間的網路。從公司到家庭,網路改變了人們工作和生活的型態。
近來,無線網路有愈來愈多的研究進而開發出相當出色的商業產品。而無線網路也逐漸取代了目前部份網路的模型。雖然無線網路帶給人壯麗的遠景,但仍有一些美中不足的因素。這些原因不外乎頻寬有限、長時間的等待、有限的傳送範圍、安全性的考量以及無線環境中時常發生的連線中斷。因而對於網路管理人員來說,如何管理和監控無線網路是一門重要的課題。
於此論文中,我們研發一種網管系統–WRMON,其意謂著”無線網路遠端監控系統”。這個系統包括無線網路遠端監控探測器和多種形式的無線網管應用程式。無線網路遠端監控探測器是用以遠程檢查和分類無線網路數據訊框的重要工具。而無線網路遠端監控管理應用程式檢索使用在電子工程師協會802.11無線網路組織所定義的資訊管理庫及此論文定義並使用的無線遠端監控系統所管理之資訊管理庫。 從無線遠端監控系統,網路管理員能容易地監控無線網路並在無線網路發生悲劇前得到更多預測及警告。
本論文盼能在嵌入式的無線遠端監控系統及其探測器和應用程式提出貢獻,將之用於對網路作監控、分析並且預測而提出的解決方案。另外,我們也延伸乙太網路的遠端監控訊息管理庫和製作無線遠端監控系統的相關訊息管理庫,用以採集並分析無線本地環路上的交通。並在我們所提供三個方法來開發無線網管理應用程式。
Networks have been in prevalent use for over a decade now. It has been the core technology enabling distributed computing, and networking for the desktop, server and backbone over the years. From the corporations to the homes, networks have changed the style of how people work and live. Recently, more and more researches on the wireless network and bring the excellent commercial products. The wireless networks have replaced gradually the model of current networks. Although the wireless networks arise a splendid, there are still some insufficient and defective factors. On account of bandwidths limits, high access latency, limit of transmissible range, security, and regular disconnection in the wireless network environment, management and monitoring is inevitable for network manager. In this thesis, we develop a network manager system –WRMON, where WRMON stands for “Wireless Remote Monitoring”. This system includes WRMON detectors and multiform wireless network management applications. The WRMON detectors are important tools for remotely examining and classifying network traffic patterns. The WRMON management applications retrieve WRMON MIBs private-defined and used in IEEE 802.11 wireless LAN. From the WRMON system, the network managers could easily monitor the wireless networks and get more predictions before the wireless network got catastrophes. This thesis contribute one idea of constructing the software Access Point with embedded WRMON detector for monitoring, analysis, pre-detection. We also extended the RMON MIBs and implemented the WRMON MIBs for gathering traffics on the wireless local loop. After applying the WRMON system on the WLL and constructing the environment, we do providing three methods to develop the WRMON management applications. We also test and construct the devices from the wireless nodes to management application on the environment.
Abstract (in Chinese) i
Abstract (in English) ii
Acknowledgement (in English) iii
List of Tables iv
List of Figures v

CHAPTER 1 1-1
INTRODUCTION 1-1
1.1 The Wireless Network 1-1
1.2 Significance of the Wireless Network Management 1-3
1.3 Issues in Managing Wireless Networks 1-5
1.4 RMON on LANs 1-6
1.5 WRMON on Wireless Local Loop 1-7
CHAPTER 2 2-1
BACKGROUND KNOWLEDGE 2-1
2.1 RMON 2-1
2.1.1 RMON Goals 2-1
2.1.2 History of RMON Documents 2-3
2.1.3 RMON Types 2-5
2.2 SNMP Protocol and SNMP Communication 2-5
2.3 Wireless Local Loop 2-6
2.3.1 Multipoint Multichannel Distribution Service (MMDS) 2-6
2.3.2 Local Multipoint Multichannel Distribution Service (LMDS) 2-6
2.4 IEEE 802.11 Wireless LAN 2-8
2.4.1 Definition 2-8
2.4.2 Two Wireless LAN Architectures 2-10
2.4.3 IEEE 802.11 Layers 2-10
2.4.4 Message Information 2-12
2.4.5 Frame formats 2-17
CHAPTER 3 3-1
SYSTEM ARCHITECTURE 3-1
3.1 OSI Network Management 3-1
3.2 TMN Model 3-2
3.2.1 TMN standard 3-3
3.2.2 TMN Architecture 3-4
3.3 WRMON Architecture 3-4
3.3.1 TMN Layer 3-4
3.3.2 WRMON Layer Architecture 3-6
3.4 WRMON Functionality Framework 3-9
3.4.1 WRMON Detector 3-10
3.4.2 WRMON MIBs 3-13
3.4.3 Management Application 3-13
3.4.4 Wireless Nodes 3-13
CHAPTER 4 4-1
WRMON AND WRMON MIB 4-1
4.1 Related Works 4-1
4.2 WRMON Management Applications 4-4
4.2.1 Detecting the real problem 4-4
4.2.2 RF signal capturing 4-4
4.2.3 Physical frame analysis 4-5
4.2.4 Wireless device configuration 4-5
4.2.5 Analyzing several network protocols 4-6
4.2.6 Roaming analysis on the ESS 4-6
4.2.7 Tracking resources 4-6
4.3 WRMON Detector 4-8
4.4 WRMON MIBs and RFC MIBs 4-10
4.4.1 RMON MIBs 4-10
4.4.2 WRMON MIBs 4-11
CHAPTER 5 5-1
IMPLEMENTATION RESULTS 5-1
5.1 Implementation 5-1
5.1.1 Wireless Devices 5-1
5.1.2 LINUX Based Operation System 5-2
5.1.3 Main Components 5-2
5.2 WRMON Detector Construction 5-4
5.2.1 Dedicated WRMON Detector 5-4
5.2.2 Software Access Point with Embedded WRMON Detector 5-5
5.3 WRMON Wireless Nodes Setup 5-6
5.3.1 Windows 98/ME/2000 5-6
5.3.2 LINUX 5-8
5.3.3 WINCE 5-8
5.4 WRMON MIBs 5-10
5.4.1 ASN.1 MIBs 5-10
5.4.2 SQL-Based MIBs 5-16
5.5 WRMON Management Application 5-17
5.5.1 PHP with WEB-Based Management Application 5-17
5.5.2 K-WRMON Management Application 5-19
5.5.3 Kylix-Development Management Application 5-19
CHAPTER 6 6-1
6.1 Conclusion 6-1
6.2 Future Work 6-1
[1]Lansford, J.; Bahl, P. “The design and implementation of HomeRF: a radio frequency wireless networking standard for the connected home,” Proceedings of the IEEE, Volume: 88 Issue: 10, Oct. 2000, Page(s): 1662 –1676.
[2]Garg, V.; Ness-Cohn, D.; Powers, T.; Schenkel, L. “Direction for element managers and network managers,” IEEE Communications Magazine, Volume: 36 Issue: 10, Oct. 1998, Page(s): 132 –138.
[3]Jae-Oh Lee, “Enabling network management using Java technologies,” IEEE Communications Magazine, Volume: 38 Issue: 1, Jan. 2000, Page(s): 116 –123.
[4]Wenli Chen; Nitin Jain; Singh, S. “ANMP: ad hoc network management protocol,” Selected Areas in Communications, IEEE Journal on, Volume: 17 Issue: 8, Aug. 1999, Page(s): 1506 –1531.
[5]SNMP Research Group, “The EMANATE run-time extensible agent system,“ SNMP Version 3 Chapter. [Online] Available WWW: http://www.snmp.com/emanateintro.html
[6]Fasbender, A.; Reichert, F.; Geulen, E.; Hjelm, J.; Wierlemann, T. “Any network, any terminal, anywhere,” IEEE Personal Communications, Volume: 6 Issue: 2, April 1999, Page(s): 22 –30.
[7]R. Braden, D. Clark, and S. Shenker, “Integrated Services in the Internet Architecture: an overview,” June 1994. Internet RFC.
[8]Lazar, A.A.; Koon-Seng Lim; Marconcini, F. “Realizing a foundation for programmability of ATM networks with the binding architecture,” Selected Areas in Communications, IEEE Journal on, Volume: 14 Issue: 7, Sept. 1996, Page(s): 1214 –1227.
[9]“System Components,” Mobile MIB Taskforce. [Online]. Available WWW: http://www.epilogue.com/mmtf/
[10]W. Stallings, “SNMP and SNMPv2: The infrastructure for network management,“ IEEE Commun. Mag., vol. 36, Mar. 1998.
[11]Uyless D. Black, “SECOND GENERATION MOBILE AND WIRELESS NETWORKS,” 1st ed. Prentice Hall, 1999.
[12]Takahashi, E.; Steenkiste, P.; Jun Gao; Fisher, A. “A programming interface for network resource management,” Open Architectures and Network Programming Proceedings, 1999. OPENARCH '99. 1999 IEEE Second Conference on, 1999, Page(s): 34 –44.
[13]Magana, E.; Aracil, J.; Villadangos, J. “PROMIS: a reliable real-time network management tool for wide area networks,” Euromicro Conference, 1998. Proceedings. 24th, Volume:2, 1998, Page(s): 581 -588 vol.2.
[14]David T. Perkins, “RMON: REMOTE MONITORING OF SNMP-MANAGED LANs,” 1st ed. Prentice Hall, 1999.
[15]Gemtek Wireless LAN PC Card and Access Point. http://www.gemtek.com.tw/.
[16]LINUX-WLAN http://www.linux-wlan.com/.
[17]Intersil Co,. IEEE 802.11 chip manufactory http://www.intersil.com/.
[18]REDHAT Co,. http://www.redhat.com/.
[19]AdventNet Co,. http://www.adventnet.com/.
[20]Amre El-Hoiydi, “Implementation Options for the Distribution System in the 802.11 Wireless LAN Infrastructure Network”, IEEE Mar. 2000.
[21]Chan, E.; Hong, X. “Analytical model for an assured forwarding differentiated service over wireless links,” Communications, IEEE Proceedings, Volume: 148 Issue: 1, Feb. 2001,Page(s): 19 –23.
[22]Dixit, S.; Yile Guo; Antoniou, ”Resource management and quality of service in third generation wireless networks, IEEE Communications Magazine, Volume: 39 Issue: 2, Feb. 2001,Page(s): 125 –133.
[23]Xiaoxin Qiu; Chawla, K.; Chuang, J.C.-I.; Sollenberger, N. “Network-assisted resource management for wireless data networks,” Selected Areas in Communications, IEEE Journal on, Volume: 19 Issue: 7, Jul 2001, Page(s): 1222 –1234.
[24]Giguere, E. ”Mobile data management: challenges of wireless and offline data access,” Data Engineering, 2001. Proceedings. 17th International Conference on, 2001 Page(s): 227 –228.
[25]Hoang Nguyen Minh; van As, H.R. “Performance analysis of distributed location management for wireless networks,” Information Networking, 2001. Proceedings. 15th International Conference on, 2001, Page(s): 25 –31.
[26]Yates, R.D.; Mandayam, N.B. “Challenges in low-cost wireless data transmission,” IEEE Signal Processing Magazine, Volume: 17 Issue: 3, May 2000, Page(s): 93 –102.
[27]Parkka, J.; Van Gils, M.; Tuomisto, T.; Lappalainen, R.; Korhonen, I. “A wireless wellness monitor for personal weight management,” Information Technology Applications in Biomedicine, 2000. Proceedings. 2000 IEEE EMBS International Conference on, 2000,Page(s): 83 –88.
[28]Ming Tan; Lee, J.; Hao Xu; Introne, J.; Matheus, C. “Wireless usage analysis for capacity planning and beyond: a data warehouse approach,” Network Operations and Management Symposium, 2000. NOMS 2000. 2000 IEEE/IFIP, 2000, Page(s): 905 –917.
[29]Rodrigues, R.C.; Mateus, G.R.; Loureiro, A.A.F. “On the design and capacity planning of a wireless local area network,” Network Operations and Management Symposium, 2000. NOMS 2000. 2000 IEEE/IFIP, 2000 Page(s): 335 –348.
[30]Chlamtec, I.; Farago, A.; Myers, A.D.; Syrotiuk, V.R.; Zaruba, G. “A performance comparison of hybrid and conventional MAC protocols for wireless networks,” Vehicular Technology Conference Proceedings, 2000. VTC 2000-Spring Tokyo. 2000 IEEE 51st, Volume: 1, 2000,Page(s): 201 -205 vol.1.
[31]CCITT Blue Book. “Recommendation M.30, Principles for a Telecommunication Management Network,” Volume IV-Fascicle IV.1, Geneva 1989.
[32]CCITT. “Recommendation M.3010, Principles for a Telecommunication Management Network,” Geneva 1992.
[33]CCITT. “Recommendation M.3010, Principles for a Telecommunication Management Network,” Geneva 1996.
[34]Ailo Pras, Bert-Jan van Beijnum, Ron Sprenkels. “Introduction to TMN,” CTIT Technical Report 99-09, The Netherlands, Apr 1999.
[35]ISO DIS 10165-1. “Information Processing Systems-Open Systems Interconnection-Structure of Management Information-Part 1: Management Information Model,” Geneva, 1993.
[36]Hadjiefthymiades, S; Merakos, L. “A resource management scheme for efficient WWW computing in wireless communications,” Vehicular Technology Conference, 1999. VTC 1999 - Fall. IEEE VTS 50th, Volume: 3, 1999, Page(s): 1755 -1759 vol.3.
[37]Qureshi, A.G. “Impact of wireless access on traffic statistics,” Signal Processing and Its Applications, 1999. ISSPA '99. Proceedings of the Fifth International Symposium on, Volume: 1, 1999, Page(s): 23 -26 vol.1.
[38]Guangyu Pei; Gerla, M. “Mobility management in hierarchical multi-hop mobile wireless networks,” Computer Communications and Networks, 1999. Proceedings. Eight International Conferences on, 1999, Page(s): 324 –329.
[39]Kidston, D.; Black, J.P.; Kunz, T. “Transparent communication management in wireless networks,” Hot Topics in Operating Systems, 1999. Proceedings of the Seventh Workshop on, 1999, Page(s): 64 –69.
[40]Singh, M.; Kar, S.; Prasad, S.; Arvind, D. “A system architecture for mobile broadband access using wireless ATM,” Personal Wireless Communication, 1999 IEEE International Conference on, 1999, Page(s): 274 –278.
[41]Kalaxylos, A.; Hadjiefthymiades, S.; Merakos, L. “Mobility management and control protocol for wireless ATM networks,” IEEE Network, Volume: 12 Issue: 4, July-Aug. 1998, Page(s): 19 –27.
[42]Papavassiliou, S.; Tassiulus, L. “Improving the capacity in wireless networks through integrated channel base station and power assignment,” Vehicular Technology, IEEE Transactions on, Volume: 47 Issue: 2, May 1998, Page(s): 417 –427.
[43]Vucetic, J.; Kline, P., “Signal monitoring system for wireless network operation and management,” Telecommunications Symposium, 1998. ITS '98 Proceedings. SBT/IEEE International, 1998, Page(s): 296 -300 vol.1.
[44]Mineno, T.; Babji, T. “Issues and challenges of implementing a wireless local loop (WLL) based telephone access network,” Personal Wireless Communications, 1997 IEEE International Conference on, 1997, Page(s): 366 –370.
[45]Barruffi, R.; Milano, M.; Montanari, R. “Planning for security management,” IEEE Intelligent Systems [see also IEEE Expert], Volume: 16 Issue: 1, Jan.-Feb. 2001, Page(s): 74 –80.
[46]Boroditsky, M.; Lam, C.F.; Feuer, M.D.; Woodward, S.L.; Frigo, N.J. “Enhancement of passive optical ring system performance by power management,” Electronics Letters, Volume: 37 Issue: 6, 15 March 2001, Page(s): 368 –370.
[47]Wenjie Wang; Gang Wei “Frame-based fast sorting scheduling algorithm for packet networks,” Electronics Letters, Volume: 37 Issue: 2, 18 Jan. 2001, Page(s): 83 –85.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top