跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.84) 您好!臺灣時間:2025/01/20 10:47
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:鄭融懋
研究生(外文):Rong-Mao Jheng
論文名稱:於保護模式啟動下之RPR網路系統效能模擬分析
論文名稱(外文):Simulative Analysis of IEEE 802.17 Resilient Packet Ring in the Protection Mode
指導教授:王文楓王文楓引用關係
指導教授(外文):Wen-Fong Wang
學位類別:碩士
校院名稱:國立雲林科技大學
系所名稱:資訊工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2008
畢業學年度:96
語文別:英文
論文頁數:128
中文關鍵詞:都會區網路保護機制彈性封包環網路
外文關鍵詞:Metropolitan NetworkProtection MechanismResilient Packet Ring
相關次數:
  • 被引用被引用:0
  • 點閱點閱:213
  • 評分評分:
  • 下載下載:10
  • 收藏至我的研究室書目清單書目收藏:0
在彈性封包環網路(IEEE 802.17)中定義了二種保護機制:引導式保護機制(steering mechanism)和包覆式(wrapping mechanism)保護機制。二者都可以在50 毫秒內將網路修復完成,並且維持各個節點之間的連通性。然而,過去極少有研究針對彈性封包網路在保護模式下之傳輸延遲和延遲抖動作分析。本論文本主要著重在解釋二種保護機制的運作特性和行為模式,我們模擬並分析了在典型的場景下,三種不同服務等級的訊框,在二種保護機制下的效能表現,得知在保護模式下的傳輸延遲和延遲抖動相對於正常情況下來得相當高。在引導式保護機制中,每條環(ringlet)的前面節點可以獲得較下游節點高的頻寬,在包覆式保護機制中,無需被繞送的訊框仍然會受到受繞送訊框的影響,而使得傳輸延遲變高,我們也比較了二種保護機制下的封包丟失個數和拓樸資料庫更新時間。藉著此次的模擬,我們可以了解二種保護機制的優缺點,以及改善空間。
IEEE 802.17 working group defines two protection mechanisms, steering and wrapping, to recover the link failure on the RPR network. Both of them can restore the network in less than 50 ms, and maintain the connectivity between each node. However, the researches of the throughput and the frame delay in the protection mechanisms are very few. This thesis focuses on explaining the characteristics of systematic operations and the behavior of the two protection mechanisms. We simulate and analyze some typical models to understand the properties of the three different traffic classes in the two mechanisms. We find that the frame delay and delay jitter in comparison with the normal condition are very high. In the steering mechanism, the head nodes of each ringlet can seize more bandwidth than their downstream nodes. In the wrapping mechanism, the frame delay of unwrapped frames may be influenced by the wrapped frames and become higher. We also compare with the numbers of dropped frames and the topology database update time in the two mechanisms. In the simulation, we can understand the advantages and the disadvantages of the two protection mechanisms and undiscovered issues to achieve further improvement.
ABSTRACT ..................................................................................................................... ii
Tables.............................................................................................................................. vi
Figures ............................................................................................................................. vi
1. Introduction .................................................................................................................. 1
1.1 Overview of recovery mechanisms .................................................................... 1
1.2 Related work....................................................................................................... 2
1.3 Motivation .......................................................................................................... 4
1.4 Structure of this thesis ........................................................................................ 5
2. Topology Discovery and Protection Mechanism.......................................................... 6
2.1 Ring and node architecture ................................................................................. 6
2.2 Packet priority and traffic shaper........................................................................ 6
2.3 Fairness algorithms............................................................................................. 8
2.4 Topology discovery and protection .................................................................... 9
2.4.1 Topology database ................................................................................... 9
2.5 Frame format .................................................................................................... 10
2.6 Fault response mechanisms ...............................................................................11
2.6.1 Steering mechanism................................................................................11
2.6.2Wrapping protection ...............................................................................11
3. Protection Simulation Mechanism ............................................................................. 13
3.1 Data path selection............................................................................................ 13
3.2 Topology database update ................................................................................ 14
3.2.1 Topology database setup........................................................................ 15
3.2.2 Failure insertion/removal....................................................................... 16
3.2.3 Topology update by receiving TP frames ...................................................... 16
3.3 Topology checksum calculation ....................................................................... 17
3.4 Context Containment........................................................................................ 18
4. Simulation Experiments ............................................................................................. 20
4.1 System parameter ............................................................................................. 20
4.2 Traffic model .................................................................................................... 20
4.3 Uniform traffic scenario ................................................................................... 22
4.3.1 Normal condition................................................................................... 22
4.3.2 Steering mechanism............................................................................... 25
4.3.3Wrapping mechanism............................................................................ 29
4.3.4 Summary................................................................................................ 34
4.4 Jitter analysis .................................................................................................... 35
4.4.1 Normal condition................................................................................... 36
4.4.2 Steering mechanism............................................................................... 37
4.4.3Wrapping mechanism............................................................................ 40
4.4.4 Summary................................................................................................ 43
4.5 Centralized traffic scenario............................................................................... 45
4.5.1 Steering mechanism............................................................................... 46
4.5.2Wrapping mechanism............................................................................ 50
4.6 Topology database update time ........................................................................ 53
5. Conclusion.................................................................................................................. 56
Reference:...................................................................................................................... 57
[1] A. Banerjee, et al. 2001, "Generalized Multiprotocol Label Switching: An Overview of Signaling Enhancements and Recovery Techniques," IEEE Communications Magazine, Volume 39, Issue 7, pages: 144-151, July.
[2] A. Kvalbein, S. Gjessing, 2004, "Analysis and improved performance of RPR protection," ICON 2004, Volume 1, pages: 119-124, November.
[3] P. Anelli, M. Soto, 1999, “Evaluation of the APS protocol for SDH rings reconfiguration,” IEEE Transactions on Communications, Volume 47, Issue 9, pages: 1386-1393, September.
[4] UPSR, http://www.sonet.com/EDU/upsr.htm
[5] BLSR, http://www.sonet.com/EDU/blsr.htm
[6] 1998, “IEEE Standard for Information technology— Telecommunications and information exchange between systems Local and metropolitan area networks— Common specifications Part 3: Media Access Control (MAC) Bridges”, ANSI/IEEE Std 802.1D, pages: 1-373.
[7] 2001, “IEEE Standard for Local and metropolitan area networks— Common specifications Part 3: Media Access Control (MAC) Bridges— Amendment 2: Rapid Reconfiguration,”IEEE Std. 802.1w-2001, pages: 1-116, June.
[8] Yuan Ping et al., 2004, "The IEEE 802.17 Media Access Protocol for High-Speed Metropolitan-Area Resilient Packet Rings", IEEE Network, Volume 18, Issue 3, pages: 8-15.
[9] V. Sharma, F. Hellstrand, 2003, “Framework for Multi-Protocol Label Switching (MPLS)-based Recovery,” IETF RFC 3469, February.
[10] J. L. Marzo, et al. 2003, "QoS Online Routing and MPLS Multilevel Protection: A Survey," IEEE Communications Magazine, Volume 41, Issue 4, pages:126-132, October
[11] P. Pan, et al. 2005, “Fast Reroute Extensions to RSVP-TE for LSP Tunnels,” IETF RFC 4090, May.
[12] S. Gjessing, et al. 2004, “IEEE 802.17 Resilient Packet Ring Tutorial,”IEEE Communications Magazine, Volume 42, Issue 3, pages: 112-118, March.
[13] Y. F. Wong, et al. “Operation, Management and Performance Issues of LAN Technologies Applied to WAN Architecture,” ISCC 2003, Volume 2, pages: 1379 - 1386, June. 58
[14] A. Kirstadter, et al. 2004, "Bandwidth-Efficient Resilience in Metro Networks - A Fast Network-Processor-Based RPR Implementation," HPSR. 2004, pages: 355-359.
[15] 2004, IEEE Draft P802.17/D3.3, April.
[16] S. Spadaro, et al. 2004, "Positioning of the RPR standard in contemporary operator environments", IEEE Network, Volume 18, Issue 2, pages: 35-40, March/April.
[17] A. Kvalbein, S. Gjessing, 2005, "Protection of RPR Strict Order Traffic," LANMAN 2005, September.
[18] M. Herzog, et al. 2005, "RINGOSTAR: An Evolutionary AWG-Based WDM Upgrade of Optical Ring Networks," Journal of Lightwave Technology, Volume 23, Issue 4, pages: 1637-1651, April.
[19] M. Maier, et al. 2005, "PROTECTORATION: A Fast and Efficient Multiple-Failure Recovery Technique For Resilient Packet Ring Using Dark Fiber", Journal of Lightwave Technology, Volume 23, Issue 4, pages: 2816-2838, October.
[20] M. Herzog, M. Maier, 2006, "RINGOSTAR: an evolutionary performance-enhancing WDM upgrade of IEEE 802.17 resilient packet ring," IEEE Communications Magazine, Volume 44, Issue 2, pages: S11-S17, February.
[21] M. Maier, M. Reisslein, 2006, "Ring in the new for WDM resilient packet ring," IEEE Potentials, Volume 25, Issue 1, pages: 22-26, January-February.
[22] Y. Liping, et al. 2006, "Study of Steering Protection Switch in Case of Unidirectional Link Failure in RPR", ICCS 2006, pages: 1-5, October.
[23] 2004, “IEEE standard for information technology-telecommunications and information exchange between systems-local and metropolitan area networks-specific requirements-part 17: resilient packet ring (RPR) access method and physical layer specifications,” IEEE Std. 802.17-2004, pages: 1-644, September.
[24] SIMSCRIPT II, http://www.simscript.com
[25] Y. S. Chen, 2006, “The Simulative Analysis of IEEE 802.17Resilient Packet Ring in QoS Properties,” Institute of Computer Science and Information Engineering, National Yunlin University of Science and Technology, Master thesis.
[26] K. Thompson, et al. 1997, “Wide-area Internet traffic patterns and characteristics,” Network, IEEE, Volume 11, Issue 6, pages: 10-23, November.
[27] Z. Xiaobo, et al. 2005, "Survivability of resilient packet rings", 2005 International Conference on Communications, Circuits and Systems, 2005. Proceedings, Volume 1, pages: 635-638.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top