跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.86) 您好!臺灣時間:2025/02/07 23:39
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:王士鳴
研究生(外文):Shih-Ming Wang
論文名稱:在WDM網路下的部份群播保護及品質服務為導向的群播保護之研究
論文名稱(外文):The Study of Partial Multicast Protection and QoS-Oriented Multicast Protection in WDM Networks
指導教授:王俊鑫王俊鑫引用關係
指導教授(外文):Chun-Hsin Wang
學位類別:碩士
校院名稱:中華大學
系所名稱:資訊工程學系碩士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2007
畢業學年度:95
語文別:中文
論文頁數:51
中文關鍵詞:WDM網路群播保護品質服務
外文關鍵詞:wdm networkmulticast protectionQoS
相關次數:
  • 被引用被引用:0
  • 點閱點閱:188
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
隨著光纖網路及分波多工(WDM)技術的發展,以及群播(multicast)應用越來越普遍,而因為光纖的高頻寬特性,當群播通訊發生單一連結錯誤時可能會造成大量資料的流失;而產生錯誤的連結下游接收端越多,所造成的影響也就越大,也因為如此,使得群播保護的議題越來越受到重視。因此許多文獻提出了一些保護群播會議的方法,然而這些方式都是以完全群播保護來做。本篇論文針對部份保護群播會議的概念來做探討,提出了四個部份群播會議保護演算法,(a)Fully multicast backbone (FMB) protection演算法來保護本篇所定義的群播骨幹,(b) Critical nodes (CN) protection演算法挑出群播會議中的重要節點來做保護,(c) Hybrid protection演算法則是為了避免前兩種部份保護的方式因為網路拓樸的關係而影響到在找尋備援路徑時可能產生失敗而提出的保護方式,(d) Arc-disjoint critical nodes protection演算法則是在方法(c)中使用了arc-disjoint的概念,跟前三種找尋沒有交集的備援樹方式不同的是,以arc-disjoint來建立的備援樹跟主要群播樹可以在同一條連結中使用不同方向的傳輸;此外本篇也在群播保護中加入了品質服務為導向的概念,將群播會議的節點分成三個層級,主要是讓一些重要的節點或是付出成本較高的使用者可以得到完善的保護。在本篇實驗中也可以明顯的看出在建立主要群播樹或備援樹時可能產生失敗的機率跟波長使用方面,部份保護的方式都會比之前尋找另外一棵沒有連結交集的備援樹來的好,而在以品質服務為導向的群播保護方面也得到不錯的效果。
With the rapid development of internet environment, network applications such as video on conference, e-learning., etc. require high bandwidth and multi-destination communications. Wavelength Division Multiplexing (WDM) technologies are generally applied to optical networks for providing the requirement of high bandwidth. Therefore, there is an emerging need for providing good survivability for multicast service against link failure such as fiber cuts.
In this paper, the concept of partial multicast protection is explored to decrease the blocking probability of establishing a multicast connection. Four partial multicast protection schemes are proposed, namely, Fully Multicast Backbone (FMB) protection, Critical Nodes (CN) protection, Hybrid protection, and Arc-disjoint Critical Nodes (AC-CN) protection. Only one destination node will not receive the data from the source node when the single failed link is not protected by the proposed partial multicast protection schemes. But the affected destination node can dynamically re-join its multicast session. The QoS-oriented multicast protection scheme is also proposed in this paper. The multicast members are classified into three classes and multicast members of different class are protected by different protection schemes. The blocking probability can be reduced by the proposed multicast protection schemes. Extended simulation is performed to study the performance of the proposed multicast protection schemes.
中文摘要 ---------------------------------------------------------I
英文摘要 --------------------------------------------------------II
誌謝 -------------------------------------------------------III
目錄 --------------------------------------------------------IV
圖目錄 --------------------------------------------------------VI
第一章、序論 ------------------------------------------------------1
1.1 前言 ----------------------------------------------------1
1.2 研究動機 ------------------------------------------------4
1.3 提出的方法 ----------------------------------------------5
1.4 論文架構 ------------------------------------------------6
第二章、背景與相關文獻 ---------------------------------------------7
2.1 分波多工及群播通訊簡介 ----------------------------------7
2.2 群播保護相關文獻 ---------------------------------------10
第三章、部份群播保護及以品質服務為導向的群播保護演算法 ------------20
3.1 完全保護及部份保護的比較 -------------------------------20
3.2 部份群播保護演算法 -------------------------------------22
3.2.1 完全群播骨幹保護 ----------------------------------22
3.2.2 關鍵節點保護 --------------------------------------23
3.2.3 綜合保護 ------------------------------------------25
3.2.4 雙向關鍵節點保護 ----------------------------------27
3.3 品質服務為導向的群播保護 --------------------------------28
3.4 重新加入群播會議的方式 ----------------------------------34
第四章、模擬與結果分析 -------------------------------------------35
4.1 模擬模式 ------------------------------------------------35
4.2 部份群播保護模擬結果 ------------------------------------36
4.3 以品質服務為導向的群播保護模擬結果 ----------------------42
第五章、結論 ------------------------------------------------------47
參考文獻 ---------------------------------------------------------48
[1] P. R. Trischitta and W. C. Marra,“Applying WDM technology to undersea cable networks,” IEEE Communications Magazine, pp. 62 – 66, Feb. 1998.
[2] M. N. Ransom and D. R. Spears,“Applications of public gigabit networks,” IEEE Network, pp. 30-40, Mar. 1992.
[3] C. Diot, W. Dabbous, and J. Crowcroft,“Multipoint communication: a survey of protocols, functions, and mechanisms,” IEEE Journal of Selected Areas in Communications, Vol. 15, Issue: 3, pp. 277-290, Apr. 1997.
[4] S. Deering,“Host Extensions for IP Multicasting,”RFC1112, Aug. 1989.
[5] W. Fenner,“Internet Group Management Protocol, Version 2,”RFC2236, Nov. 1997.
[6] D. Waitzman, C. Partridge, and S. Deering,“Distance Vector Multicast Routing Protocol,”RFC1075, Nov. 1988.
[7] J. Moy,“MOSPF: Analysis and Experience,”RFC 1585, March 1994.
[8] A. Ballardie,“Core Based Trees (CBT version 2) Multicast Routing,”RFC 2189, September 1997.
[9] D. Estrin, D. Farinacci, et al.,“Protocol Independent Multicast-Sparse Mode(PIM-SM): Protocol Specification,”RFC 2362, June 1998.
[10] S. Ramamurthy and B. Mukherjee,“Survivable WDM mesh networks. Part I-Protection,”in Proc. IEEE INFOCOM, vol.2, pp. 744-751, Mar. 1999.
[11] S. Ramamurthy and B. Mukherjee,“Survivable WDM mesh networks. II. Restoration,”IEEE International Conference on Communications, pp. 2023– 2030, June 1999.
[12] O. Crochat and J. Y. Le Boudec,“Design protection for WDM optical networks,”IEEE J. Select. Areas Commun., Vol. 16, pp. 1158-1165, Sept. 1998.
[13] Canhui (Sam) Ou, Smita Rai, and Biswanath Mukherjee,“Extension of Segment Protection for Bandwidth Efficiency and Differentiated Quality of Protection in Optical/MPLS Networks,”Optical Switching and Networking, Vol. 1, pp. 19-33, Jan. 2005.
[14] Canhui Ou, Jing Zhang, Hui Zang, L.H. Sahasrabuddhe, and B. Mukherjee, “New and improved approaches for shared-path protection in WDM mesh networks,”IEEE Journal of Lightwave Technology, Vol. 22, Issue 5, pp.1223– 1232, May 2004.
[15] S. Ramamurthy, L. Sahasrabuddhe, and B. Mukherjee,“Survivable WDM mesh networks,” IEEE Journal of Lightwave Technology, Vol. 21, pp. 870-883, Apr. 2003.
[16] Mei Yang, Jianping Wang, Xiangtong Qi, and Yingtao Jiang,“On finding the best partial multicast protection tree under dual-homing architecture,”2005 Workshop on High Performance Switching and Routing, HPSR, pp. 128-132, May 2005.
[17] Dongyun Zhou and S. Subramaniam,“Survivability in optical networks,” IEEE Network, Vol. 14, pp.16 – 23, Nov.-Dec. 2000.
[18] I. Chlamtac, A. Ganz, and G. Karmi,“Lightpath communications: an approach to high bandwidth optical WAN's,”IEEE Transactions on Communications, Vol. 40, pp.1171 – 1182, July 1992.
[19] K.C. Lee and V.O.K. Li,“A wavelength-convertible optical network,” IEEE Journal of Lightwave Technology, Vol. 11, pp. 962-970, May-June 1993.
[20] L.H. Sahasrabuddhe and B. Mukherjee,“Light trees: optical multicasting for improved performance in wavelength routed networks,”IEEE Communications Magazine, Vol. 37, pp.67–73, Feb. 1999.
[21] M. Medard, S.G.. Finn, R.A. Barry, and R.G.. Gallager,“Redundant trees for preplanned recovery in arbitrary vertex-redundant or edge-redundant graphs,” IEEE/ACM Transactions on Networking, Vol. 7, pp. 641 – 652, Oct. 1999.
[22] Aiguo Fei, Junhong Cui, M. Gerla, and D. Cavendish,“A dual-tree scheme for fault-tolerant multicast,” IEEE International Conference on Communications, Vol. 3, pp. 690 – 694, June 2001.
[23] C. Boworntummarat, L. Wuttisittikulkij, and S. Segkhoonthod,“Light-tree based protection strategies for multicast traffic in transport WDM mesh networks with multifiber systems,” IEEE International Conference on Communications, pp.1791 – 1795, June 2004.
[24] N. K. Singhal, L. H. Sahasrabuddhe, and B. Mukherjee,“Provisioning of survivable multicast sessions against single link failures in optical WDM mesh networks,”IEEE Journal of Lightwave Technology, Vol. 21, pp. 2587 - 2594, Nov. 2003.
[25] Ying Zhang and D. Sidhu,“A multicast protection algorithm for optical WDM networks,”13th International Conference on Computer Communications and Networks, pp. 315 – 320, 2004.
[26] T. Rahman and G.. Ellinas,“Protection of multicast sessions in WDM mesh optical networks,”Optical Fiber Communication Conference, Vol. 2, March 2005.
[27] A. Khalil, A. Hadjiantonis, G.. Ellinas, and M. A. Ali,“Pre-planned multicast protection approaches in WDM mesh networks,” 31st European Conference on Optical Communication, pp.25 – 26, Vol. 1, Sept. 2005.
[28] Narendra Singhal, Canhui (Sam) Ou, and Biswanath Mukherjee “Cross-Sharing vs. Self-Sharing Trees for Protecting Multicast Sessions in Mesh Networks,”Computer Networks Journal, Special Issue on Optical Networks, Vol. 50, pp. 200-206, Feb. 2006.
[29] N. K. Singhal and B. Mukherjee,“Protecting multicast sessions in WDM optical mesh networks,”IEEE Journal of Lightwave Technology, Vol. 21, pp. 884– 892, Apr. 2003.
[30] N. K. Singhal, Canhai Ou, and B. Mukherjee,“Shared protection for multicast sessions in mesh networks,”Optical Fiber Communication Conference, Vol. 2, March 2005.
[31] W. Fawaz, F. Martignon, K. Chen, and G.. Pujolle,“A novel protection scheme for quality of service aware WDM networks,” IEEE International Conference on Communications, Vol. 3, pp.1720 – 1725, May 2005.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top