簡易檢索 / 詳目顯示

研究生: 劉川綱
Liu, Chuan-Gang
論文名稱: 終端網路量測系統:一個創新的終端系統量測架構
EndMon System: A Novel End-system Monitoring Architecture
指導教授: 李忠憲
Li, Jung-Shian
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 電機工程學系
Department of Electrical Engineering
論文出版年: 2002
畢業學年度: 90
語文別: 英文
論文頁數: 60
中文關鍵詞: 傳輸控制協定管理資訊簡單網路管理協定終端網路量測系統廣播系統
外文關鍵詞: EndMon, SNMP, MIB, TCP, Multicast.
相關次數: 點閱:75下載:2
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 對於網路管理領域,能夠知道路徑與網路節點的網路資訊是很重要的。傳統的量測工具大都是藉由擷取路由器內簡單網路管理協定的管理資訊。然而,來自路由器的資訊不是絕對的可靠。本篇論文,提供一個創新的監測架構,叫做終端網路量測系統。不同於被動式的監測方式需要擷取路由器簡單網路管理協定的管理資訊,終端網路量測系統是用主動式的監測方式估測網路資訊。終端網路量測系統在網路監測上,提供了另一個監測網路狀況的方法。而且,引用終端網路量測系統的應用程式,並不會影響其他的應用程式的效能還可以得到較好的效能,例如引用終端網路量測系統所收集的網路資訊的傳輸控制協定(TCP)和終端廣播系統都可以證明終端網路量測系統所帶來的優點。此外,在這篇論文我也對一些量測上所會遇到的困難作一些討論。

    It is important to pinpoint information of nodes and links for management of networks. Traditional measurement tools report the condition of networks by getting SNMP (Simple Network Management Protocol) MIB (Management Information Base) messages of routers. However, the messages from routers may not be 100% reliable. In this thesis, we provide a novel monitoring architecture, called “EndMon system”. Different from the passive way to rely on the information of SNMP MIBs in routers, EndMon system estimates network parameters using active probes. The EndMon system provides double-checks for network monitoring. Moreover, EndMon-aware applications achieve better performance, without affecting EndMon-unaware applications. EndMon-aware TCP and end-system multicast applications are provided to indicate the advantages of EndMon system in the experiments. In this thesis, we also discuss issues of measurement.

    Table of Contents Chapter 1 Introduction 1 Chapter 2 Motivation and Related Works 4 2.1 Network management architecture 5 2.2 Network management approaches 7 2.2.1 Passive way 7 2.2.1.1 Packet-capture-based monitoring 8 2.2.1.2 SNMP-based monitoring (Polling for information gathered by management agent) 9 2.2.2 Active way 12 2.2.2.1 Two kinds in active way -- ping-based and non ping-based 13 Chapter 3 EndMon System 17 3.1 EndMon system in the field of network management 18 3.2 Architecture of EndMon system 20 3.2.1 Communication between users and EndMon station 20 3.2.2 Exchanging information of domain members among EndMon stations 23 3.2.3 EndMon system module 25 3.3 Alert mechanism of EndMon system 36 Chapter 4 Implementation of EndMon System 37 4.1 NBEN 37 4.2 EndMon system on NBEN 38 4.3 EndMon-aware End-System multicasting 45 Chapter 5 One-Packet Technique 48 5.1 Topology of simulations 49 5.2 Results of simulations 49 5.2.1 Simulation 1 50 5.2.2 Simulation 2 51 5.2.3 Simulation 3 52 Chapter 6 Conclusions and Future Work 55 6-1 Conclusions 55 6-2 Future work 56 Bibliography 58

    Bibliography
    [1] W. Stallings, “SNMP SNMPv1 SNMPv2 SNMPv3, and RMON 1 and 2(Third Edition)”, Addison Wesley Longman, Inc., 1999.
    [2] J. Case SNMP Research, M. Fedor, M. Schoffstall Performance Systems International, J. Davin MIT Laboratory for Computer Science, “Simple network management procotol”, Tech. Rep. RFC 1157, May 1990.
    [3] ISO 9596: “Information Processing Systems - Open Systems Interconnection, Management Information Protocol Specification - Part 2: Common Management Information Protocol”, 22 December 1988.
    [4] Internetworking Technology Overview / Network Management Basics, online, http://cio.cisco.com/univercd/data/doc/cintrnet/ito/55018.htm.
    [5] Tcpdump, online, http://www.tcpdump.org.
    [6] Snoop, online, http://www.cyber-snoop.com/index.html.
    [7] Joel Apisdorfk Clasffy (NLANR) Kevin Thompson and Rick Wilder MCI/vBNS, “OC3MON: flexible, affordable, high performance statistic collection”, online, http://www.nalnr.net/NA/Oc3mon/.
    [8] N. Brownlee, “NetTraMet v.4.2 Users’ Guide,” online, http://www.auckland.an.nz/net/Accounting/, 1998.
    [9] Tcpshow, online, http://www.trionetworks.com/tools/tcpshow.htm.
    [10] Tcptrace, online, http://www.tcptrace.org/.

    [11] Lake, Craig. “Simple Network Management Protocol (SNMP)”online,
    http://www.sei.cmu.edu/str/docs/SNMP.html
    [12] Stallings, William. “SNMP, SNMPv2, and CMIP” Don Mills: Addison-Wesley, 1993.
    [13] PingER, online, http://www-iepm.slac.stanford.edu/pinger/.
    [14] AMP, online, http://amp.nlanr.net/AMP/.
    [15] Surveyor, online, http://www.advanced.org/csg-ippm/.
    [16] RIPE, online, http://www.ripe.net/test-traffic/index.html/.
    [17] K. Thompson, G.J.Miller and R.Wilder, ”Wide-area Internet traffic patterns and characteristics”, IEEE Network, Vol.11, No. 6, pp. 10~23, Nov. 1997.
    [18] C. R. Cunha, A. Bestavros and M. E. Corvella, “Characteristics of WWW client based traces”, Technical Report BU-CS-95-010, Boston University, Jul 1995.
    [19] B. A. Mah, “An empirical model of HTTP network traffic”, In Proceedings of IEEE INFOCOM’97, Vol. 2, pp. 592-600, Apr 1997.
    [20] R.Fielding, J.Gettys, J. Mogul, H.Frystyk, and T.Berners-Lee, “Hypertext transfer protocol – http1.1”, Tech. Rep. RFC2068, IEFT, Jan. 1997.
    [21] J. Postel, “Transmission control protocol”, Tech. Rep. RFC793, DARPA, Sept. 1981.
    [22] Lee Breslau, Edward W. Knightly, Scott Shenker, Ion Stoica, Hui Zhang, “Endpoint Admission Contorl: Architecture Issues and Performance”, In Proceedings of ACM SIGCOMM ’00, pp. 57 – 69, Auguest 2000.
    [23] MySQL, online, http://www.mysql.com/.
    [24] V. Jacobson, “Pathchar – a tool infer characteristics of Internet paths”, Presented at the Mathematical Sciences Research Institute, 1997.
    [25] A.B.Downey, “Using pathchar to Estimate Internet Link Characteristics”, In Proceedings of ACM SIGCOMM ’99, pp. 241-250, August 1999.
    [26] Bruce A. Mah, “Pchar: a tool for measuring network path charactertertics”, online, http://www.ca.sandia.gov /~ bmah/Software/pchar.
    [27] Allen B. Downey, Clink, online, http://rocky.wellesley.edu/downey/clink/.
    [28] Kazumine Matoba, Masayuki Murata, “Improving Bandwidth Estimation for Internet Links by Statistical Methods”, In department of Informatics and Mathematical Science Graduate School of Engineering Science, Osaka University.
    [29] J. W. Tukey. “Introduction to today’s data analysis,” In Proceedings of the Conference on Critical Evaluation of Chemical and Physical Structural Information, pp. 3-14, 1974.
    [30] M. G. Kendall. “Rank correlation methods”, Fourth edition. London: Griffin, p. 5, 1970.
    [31] J. A. Hartigan. “Clustering algorithms”, John Wiley & Sons, 1975.
    [32] D. Rubenstein, J. Kurose and D. Towsley, “Detecting Shared Congestion of Flows via End-to-End Measurement”, In Proceedings of ACM SIGMETRICS ’00, pp. 145-155, May 2000.
    [33] The Network Simulator – ns-2, online, http://www.isi.edu/nsnam/ns/
    [34] S.McCreary and M.C. Claffy, “Trends in Wide Area IP Traffic Patterns”, Tech. Rep., CAIDA, Feb. 2000.
    [35] PHP, online, http:// http://www.php.net/.

    下載圖示 校內:立即公開
    校外:2002-08-14公開
    QR CODE