透過您的圖書館登入
IP:3.145.74.54
  • 學位論文

派翠網路模型與分析應用於具有部分頻寬之路徑保護系統的成本最佳化

Petri Net Modeling and Analysis for Cost Optimization of a Path Protection System with Partial Bandwidth

指導教授 : 沈榮麟
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


隨著人們生活中越來越多的設備開始與網路連接,需要確保連接來源的可靠性,提供各種頻寬給網路上訊息交換的資料流量服務,又同時保持最低的營運成本,這將會是網路工程師所面臨的挑戰之一;為了解決未預期的資料流量錯誤,必須尋找及檢查網路路徑,但同時營運商也必須盡可能地將路徑距離縮小,才可以保持其合理利潤。本研究中在變化式雙向成本的演算法 TDC (Toggling Dual Cost Algorithm)的基礎上,我們開發一套α+1路徑保護系統來優化營運成本,該演算法是建立於派翠網路之上,作為一個可同時應用於非同步模組化開發系統(modeling asynchronous)及現階段系統中的強大工具,最後我們也利用派翠網路中具備的有邊界性(Boundedness)和存活性(Liveness),來確保執行時沒有溢位(Overflow)或死結(Deadlock)的問題發生。在此運作模式下,網路工程師可以利用優化的TDC演算法(Optimized TDC Algorithm),在不犧牲網路可靠性的前提下獲得最合理的利潤。

並列摘要


As the people become more and more connected to each other through Internet services, the need for ensuring reliability in Internet connection becomes unavoidable. To serve data traffic with varying degree of importance while maintaining the lowest operational expense is one of challenges faced by network engineers. Critical data traffic must be protected from termination caused by unwanted failure that could happen along the path, but at the same time, the operational expense spent on the path protection must be as minimum as possible, which ensures the Internet provider gains reasonable profit from its services. In this study, we optimize the operational expense of α+1 path protection system based on Toggling Dual Cost (TDC) algorithm. The algorithm is modeled by a Petri net, a powerful tool for modeling asynchronous and concurrent systems. The model is analyzed based on Petri net properties, namely, boundedness and liveness. Based on boundedness and liveness properties, we make sure that the proposed model has no overflow or deadlock problem in its implementation. From the proposed model, the network engineers can optimize the TDC algorithm to reach maximum efficiency, in order to obtain reasonable profit without sacrificing the network reliability.

參考文獻


[1] S. Y. Liew and M. L. Gan, “An exact optimum paths-finding algorithm for α+1 path protection,” International Conference on Information Networking, pp. 210-215, Feb. 2012.
[2] T. Murata, “Petri nets: properties, analysis and applications,” Proceedings of the IEEE, vol. 77, no.4, pp. 541-580, Apr. 1989.
[4] H. Hu, M. Zhou and Z. Li, “Low-cost and high-performance supervision in ratio-enforced automated manufacturing systems using timed Petri nets,” IEEE Transactions on Automation Science and Engineering, vol. 7, no. 4, pp. 933-944, Oct. 2010.
[5] L. Gniewek, “Sequential control algorithm in the form of fuzzy interpreted Petri nets,” IEEE Transactions on Systems, Man, and Cybernetics, vol. 43, no. 2, pp. 451-459, Mar. 2013.
[6] S. M. Chen, “Weighted fuzzy reasoning using weighted fuzzy Petri nets,” IEEE Transactions on Knowledge and Data Engineering, vol. 14, no. 2, pp. 386-397, Apr. 2002

延伸閱讀