透過您的圖書館登入
IP:18.224.39.32
  • 學位論文

在IP網路中基於最短路徑以IP-in-IP穿隧技術的多點跳躍保護

IP-in-IP tunnelling mechanism for multihop protection in IP network based on shortest path criteria

指導教授 : 吳承崧
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


IP網路是目前網際網路的核心基礎, 所以傳送IP封包的路由協定將影響整個網路的使用效率與通訊品質。 所以一個好的IP網路設計會有幾種特性: 簡單性、採分封交換方式、非連結式、無記憶型態、不可靠但盡力傳送的服務模式。因此, IP協定有幾個優點: 較有彈性、較強健、成本較低、提供一般化的服務與可在任何系統平台上執行等優點。 在IP網路中,因網路設備損壞而提出的解決機制可分為兩種: 網路重置與網路保護。 網路重置簡單的說就是快速重新計算新路徑,但重新計算新路徑會產生許多的問題,其中之一就是收斂太慢的問題。 當設備損壞而重新收歛的時間往往需要數百毫秒甚至數十秒的時間,這對需要即時處理服務的使用者是不能接受的。 如果在重新計算新路徑的時間內,先將封包導向事先計算好的備援路徑,不但可以大大的縮短服務中斷所造成的不便,也可以降低封包的遺失、提升服務品質。本論文所提出IP-in-IP tunnel的方法就是屬於網路保護的一種。當某一節點偵測所要傳遞封包的下一節點產生損壞,不管是節點相鄰之間的連結損壞或者是節點本身的損壞,先將封包封裝然後導向我們預定的目標節點,這個節點有可能在附近,也有可能在很遠的地方。等到目標節點收到被封裝的封包,於是開始解封裝,在根據本身的路由資訊將封包傳遞到目的地,完成整個網路保護的程序。

關鍵字

網路保護 IP網路

並列摘要


The IP network is the core foundation of the Internet routing protocol for transmission of IP packets will affect the efficiency in the use of the entire network and communications quality. A good IP network will have several characteristics:simplicity, packet-switched, connectionless, memoryless, best-effort. Therefore, Internet protocol has several advantages: flexible, robust, lower cost, provide the advantages of generalized service can be executed on any platform. Solve mechanism in IP network, network equipment damage can be divided into two types: network restoration and network protection. Network restoration is to quickly re-calculate a new path, but to re-calculate the new path will have many problems, one of which is the convergence is too slow. When the failure to the equipment and re-convergence often requires hundreds of milliseconds or even tens of seconds of time, the immediate need to deal with service users is not acceptable. In time to re-calculate a new path, the first packet-oriented prior computed backup path, not only can greatly shortest the inconvenience caused by service interruptions, but also can reduce the packet loss, improve service quality. We proposed IP-in-IP tunnel is to belong to network. When the detection of a node to pass the packet to the next node is failure, whether it is the node adjacent to the link between the failure or the node itself is failure, the first packet is encapsulated and then directed to the intended target node, this node may nearby, there may be very far away. Wait until the destination node receives the packet is encapsulated, and began to decapsulation, according to their own routing information packets will be passed to the destination, complete the entire network protection procedures.

並列關鍵字

IP-in-IP tunnel

參考文獻


[7] S.Rai,B.Mukherjee, and O.Deshpande, “IP Resilience within an Autonomous System: Current Approaches, Challenges,and Furture Directions,”IEEE Communications Maganize,Oct.2005.
[8]Hui-Kai Su, and Cheng-Shong Wu,“Local Link Protection Scheme in IP network,”2007.
[14]A.Median, A. Lakhina, I. Matta,and J. Byers, “BRITE: an approach to universal topology generation,”in Proc. IEEE Modeling Analysis and Simulation of Computer and Telecommunication Systems, 15-18 Aug. 2001.
參考文獻
[1] C. Alaettinoglu and A. Zinin,“IGP fast reroute”,in IETF Routing Mtg., Atlanta, GA, USA, Nov.2002

被引用紀錄


鄭凱璘(2013)。基於NDN網路的高效能動態網路負載調節機制以減少能源消耗〔碩士論文,淡江大學〕。華藝線上圖書館。https://doi.org/10.6846/TKU.2013.00335

延伸閱讀