跳到主要內容

臺灣博碩士論文加值系統

(3.235.120.150) 您好!臺灣時間:2021/08/03 04:45
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:楊文琪
研究生(外文):Wen-Chi Yang
論文名稱:在IP-over-WDM網路下建構一個快速且以環為基礎的障礙管理機制
論文名稱(外文):An fast ring-based fault management scheme in IP-over-WDM networks
指導教授:王文楓王文楓引用關係
指導教授(外文):Wen-Fong Wang
學位類別:碩士
校院名稱:國立雲林科技大學
系所名稱:電子與資訊工程研究所碩士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2004
畢業學年度:92
語文別:中文
論文頁數:83
中文關鍵詞:光網路障礙管理機制
外文關鍵詞:IP-over-WDM networksRing-basedFault management scheme
相關次數:
  • 被引用被引用:0
  • 點閱點閱:123
  • 評分評分:
  • 下載下載:7
  • 收藏至我的研究室書目清單書目收藏:0
本論文主要是探討在IP-over-WDM網路下,如何建構一個快速且以環為基礎的障礙管理機制。傳統的障礙管理機制分為Protection及Restoration兩大類:Protection機制能提供較佳的保護品質且回復速度快,但卻需要大量的備用頻寬;Restoration機制不需備用頻寬且有彈性,但保護品質較差而且回復時間較長。由於兩者的優缺點皆太過極端,因此我們希望發展出一個新的障礙管理機制能擁有兩者的優點並避免兩者的缺點存在。在我們的構想中,我們將在網路上預先建構一個環,但環的環路徑上並不預留任何頻寬;每當網路上有故障情況發生,即可利用該環的環路徑作為訊務的回復路徑,迅速的將訊務傳輸到目的地節點,完成回復工作。這個機制的好處是:由於有預先建構的路徑可使回復速度接近Protection機制的回復速度,同時也因為不預留網路上的任何頻寬所以不會造成頻寬的浪費。
In this thesis, we will design a fast ring-based fault management scheme in IP-over-WDM networks. Traditionally, there are two classes for fault management schemes: Protection and Restoration. The advantages of Protection are the higher quality of protection and the faster recovery speed. But it needs much redundancy bandwidth for backup paths. In contrast, Restoration does not need any redundancy bandwidth and it is flexible. But its disadvantages are the lower quality of protection and the longer recovery time. Therefore, we design a new fault management scheme. The new scheme is to construct beforehand a Protection Ring in the IP-over-WDM network and it does not reserve any bandwidth on the ring path. When a link fails, the scheme will switch the traffic to the Protection Ring. Then, the scheme transfers the traffic to the destination node by the ring path. The recovery speed of the scheme is as fast as Protection because it makes use the ring path as the recovery path. And it does not need to reserve any redundancy bandwidth for backup path.
中文摘要...............................................................i
英文摘要..............................................................ii
誌謝.................................................................iii
目錄..................................................................iv
表目錄.................................................................v
圖目錄................................................................vi
第一章 概論............................................................1
1.1 簡介..........................................................2
1.2 IP-over-WDM Networks..........................................3
1.3 Protection機制...............................................10
1.4 Restoration機制..............................................15
1.5 新的解決方案.................................................18
第二章 障礙處理機制模型...............................................19
2.1 系統模型.................................................19
2.2 Protection Ring之故障處理................................24
2.3 建構一個最佳Protection Ring的準則........................32
第三章 Protection Ring的回復機制......................................36
3.1 Protection Ring的回復機制................................36
3.2 建構一個最佳Protection Ring的演算法流程圖................44
3.3 建構一個最佳Protection Ring的演算法......................48
第四章 應用與評估.....................................................53
4.1 三種障礙管理機制的評估...................................53
第五章 結論...........................................................70
參考文獻..............................................................72
[1]E. Rosen, A. Viswanathan, R.Callon, 2001, “Multiprotocol Label Switching Architecture”, RFC 3031, IETF, January.
[2]L. Anderson, et al., 2001, “LDP Specification”, RFC 3036, IETF, January.
[3]B. Jamoussi, et al., 2002, “Constraint-Based LSP Setup using LDP”, RFC 3212, IETF, January.
[4]R. Braden, et al., 1997, “Resource ReSerVation Protocol (RSVP) – Version 1 Functional Specification”, RFC 2205, IETF, September.
[5]Ayan Banerjee, et al., 2001, “Generalized Multiprotocol Label Switching: An Overview of Routing and Management Enhancements”, IEEE Communications Magazine, pp.144-150, January.
[6]Ayan Banerjee, et al., 2001, “Generalized Multiprotocol Label Switching: An Overview of Signaling Enhancements and Recovery Techniques”, IEEE Communications Magazine, pp.144-151, July.
[7]Pin-Han Ho, et al., 2002, “A Framework for Service-Guaranteed Shared Protection in WDM Mesh Networks”, IEEE Communications Magazine, pp.97-103, February.
[8]Jian Wang, Laxman Sahasrabuddhe, Biswanath Mukherjee, 2002, “Path vs. Subpath vs. Link Restoration for Fault Management in IP-over-WDM Networks: Performance Comparisons Using GMPLS Control Signaling”, IEEE Communications Magazine, pp.80-87, November.
[9]L. M. Gardner, et al., 1994, “Techniques for Finding Ring Covers in Survivable Networks”, IEEE, pp.1862-1866.
[10]Yang Qin, Lorne Mason, Ke Jia, 2003, “Study on a Joint Multiple Layer Restoration Scheme for IP over WDM Networks”, IEEE Network, pp.43-48, March/April.
[11]S. Ramamurthy, Biswanath Mukherjee, 1999, “Survivable WDM Mesh Networks, Part I – Protection”, IEEE, pp.744-751.
[12]S. Ramamurthy, Biswanath Mukherjee, 1999, “Survivable WDM Mesh Networks, Part II – Restoration”, IEEE, pp.2023-2030.
[13]Wen-Chi Yang, Wen-Fong Wang, 2003, “Multi-layer Fault Management in IP-over-WDM Networks”, Symposium on Digital Life and Internet Technologies, September.
[14]Georgios Ellinas, Aklilu Gebreyesus Hailemariam, Thomas E. Stern, 2000, “Protection Cycles in Mesh WDM Networks”, IEEE Journal on Selected Areas in Communications, vol. 18, pp.1924-1937, October.
[15]Laxman Sahasrabuddhe, S. Ramamurthy, Biswanath Mukherjee, 2002, “Fault Management in IP-over-WDM Networks: WDM Protection Versus IP Restoration”, IEEE Journal on Selected Areas in Communications, vol. 20, pp.21-33, January.
[16]Izhak Rubin, Jing Ling, 2000, “Failure Protection Methods for Optical Meshed-Ring Communications Networks”, IEEE Journal on Selected Areas in Communications, vol. 18, pp.1950-1960, October.
[17]D. Stamatelakis, W. D. Grover, 2000, “Theoretical Underpinnings for the Efficiency of Restorable Networks Using Preconfigured Cycles (“p-cycles”)”, IEEE Transactions on Communications, vol. 48, pp.1262-1265, August.
[18]Wayne D. Grover, Demetrios Stamatelakis, 1998, “Cycle-Oriented Distributed Preconfiguration: Ring-like Speed with Mesh-like Capacity for Self-planning Network Restoration”, IEEE, pp.537-543.
[19]Demetrios Stamatelakis, Wayne D. Grover, 2000, “IP Layer Restoration and Network Planning Based on Virtual Protection Cycles”, IEEE Journal on Selected Areas in Communicaitons, vol. 18, pp.1938-1949, October.
[20]Thomas H. Cormen, et al., 1998, “Introduction to Algorithms”, Twentieth printing, McGraw-Hill Book Company.
[21]Neil Jerram, Adrian Farrel, 2001, “MPLS in Optical Networks”, Data Connection White Paper.
[22]Nic Larkin, 2002, “ASON and GMPLS – The Battle of the Optical Control Plane”, Data Connection White Paper.
[23]Eric Mannie, 2003, “Generalized Multi-Protocol Label Switching Architecture”, IETF, Draft, May.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top