請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/38254完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 雷欽隆(Chin-Laung Lei) | |
| dc.contributor.author | Siong-Ui Te | en |
| dc.contributor.author | 戴上為 | zh_TW |
| dc.date.accessioned | 2021-06-13T16:28:52Z | - |
| dc.date.available | 2005-07-19 | |
| dc.date.copyright | 2005-07-19 | |
| dc.date.issued | 2005 | |
| dc.date.submitted | 2005-07-13 | |
| dc.identifier.citation | [1] S. Ortiz Jr., 'Virtual Private Networks: Leveraging the Internet,' IEEE Computer, Vol. 30, No. 11, pp. 18-20, November 1997.
[2] S. Kent and R. Atkinson, 'Security Architecture for the Internet Protocol,' RFC 2401, No-vember 1998. [3] P. Knight and C. Lewis, 'Layer 2 and 3 Virtual Private Networks: Taxonomy, Technology, and Standardization Efforts,' IEEE Communications Magazine, Vol. 42, No. 6, pp. 124-131, June 2004. [4] O. Elkeelany, M. M. Matalgah, K. P. Sheikh, M. Thaker, G. Chaudhry, D. Medhi, and J. Qaddour, 'Performance Analysis of IPSec Protocol: Encryption and Authentication,' Pro-ceedings of 2002 IEEE International Conference on Communications (ICC 2002), Vol. 2, pp. 1164-1168, April 2002. [5] J.-C. Lin, C.-T. Chang, and W.-T. Chung, 'Design, Implementation and Performance Evaluation of IP-VPN,' Proceedings of 17th International Conference on Advanced Infor-mation Networking and Applications (AINA 2003), pp. 206-209, March 2003. [6] S. Khanvilkar and A. Khokhar, 'Virtual Private Networks: An Overview with Performance Evaluation,' IEEE Communications Magazine, Vol. 42, No. 10, pp. 146-154, October 2004. [7] D. Kettler, H. Kafka, and D. Spears, 'Driving Fiber to the Home,' IEEE Communications Magazine, Vol. 38, No. 11, pp. 106-110, November 2000. [8] C. Metz, 'The Latest in Virtual Private Networks: Part I,' IEEE Internet Computing, Vol. 7, No. 1, pp. 87-91, January/February 2003. [9] C. Metz, 'The Latest in Virtual Private Networks: Part II,' IEEE Internet Computing, Vol. 8, No. 3, pp. 60-65, May/June 2003. [10] M. Carugi and J. De Clercq, 'Virtual Private Network Services: Scenarios, Requirements and Architectural Constructs from a Standardization Perspective,' IEEE Communications Magazine, Vol. 42, No. 6, pp. 116-122, June 2004. [11] J. De Clercq and O. Paridaens, 'Scalability Implications of Virtual Private Networks,' IEEE Communications Magazine, Vol. 40, No. 5, pp. 151-157, May 2002. [12] B. Devlin, J. Gray, B. Laing, and G. Spix, 'Scalability Terminology: Farms, Clones, Parti-tions, and Packs: RACS and RAPS,' Microsoft Research Technical Report MS-TR-99-85, December 1999. [13] A. Hodjat and I. Verbauwhede, 'High-Throughput Programmable Cryptocoprocessor,' IEEE Micro, Vol. 24, No. 3, pp. 34-45, May/June 2004. [14] C.-S. Ha, J.-H. Lee, D.-S. Leem, M.-S. Park, and B.-Y. Choi, 'ASIC Design of IPSec Hardware Accelerator for Network Security,' Proceedings of 2004 IEEE Asia-Pacific Con-ference on Advanced System Integrated Circuits (AP-ASIC 2004), pp. 168-171, August 2004. [15] R. Friend, 'Making the Gigabit IPsec VPN Architecture Secure,' IEEE Computer, Vol. 37, No. 6, pp. 54-60, June 2004. [16] Y.-N. Lin, C.-H. Lin, Y.-D. Lin, and Y.-C. Lai, 'VPN Gateways over Network Processors: Implementation and Evaluation,' Proceedings of 11th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2005), pp. 480-486, March 2005. [17] Intel(R) Corporation, 'Intel(R) IXP425 Network Processor,' http://www.intel.com/design/network/products/npfamily/ixp425.htm. [18] The Tolly Group, 'Intel(R) IXP425 Network Processors: Performance Analysis of VPN De-vices,' Document No. 204132, July 2004. [19] M. Han, J. Kim, and S. Sohn, 'Network Processor for IPSec,' Proceedings of 6th Interna-tional Conference on Advanced Communication Technology (ICACT 2004), Vol. 1, pp. 485-487, February 2004. [20] D. E. Comer, Network Systems Design Using Network Processors, Prentice Hall, ISBN: 0-13-141792-4, January 2003. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/38254 | - |
| dc.description.abstract | 這篇論文在叢集式虛擬私用網路閘道器的基礎上,提出可重組化之叢集式虛擬私用網路閘道器。在不停止虛擬私用網路服務的前提下,此設計能動態地增加或減少叢集閘道器內機器。同時也達成了容錯的目標。除了可重組化外,此叢集閘道器同時也有負載分享的機制,可以將負載分攤到各台機器上,避免造成機器負載過重的情形。最後從實作及評估的圖表中,驗證所提出的方案正確性。 | zh_TW |
| dc.description.abstract | Based on the VPN gateway using cluster, a reconfigurable VPN gateway via adaptive clustering is proposed in the thesis. Without stopping the VPN service, the proposed VPN gateway can dynamically add or delete a node in the cluster. Reconfiguration of the gateway also implies fault tolerance of the gateway. In addition to reconfiguration, there is also load sharing mechanism in the VPN gateway. The mechanism can share load to each node in the cluster and avoid overloaded nodes in the cluster. Finally, correctness of the proposed gateway is verified from implementation and evaluation figures. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-13T16:28:52Z (GMT). No. of bitstreams: 1 ntu-94-R92921023-1.pdf: 654551 bytes, checksum: 928fbb6e8278cdc5354cb78e984c63ad (MD5) Previous issue date: 2005 | en |
| dc.description.tableofcontents | Chapter 1 Introduction 1
1.1 VPN Technology 1 1.2 VPN Gateway via Clustering 5 1.3 Reconfiguration of VPN Gateway via Clustering 6 1.4 Thesis Organization 8 Chapter 2 Related Work 9 2.1 System Architecture 9 2.2 Traffic Dispatching Technique 12 2.3 Traffic Redistribution Technique 12 2.4 The Scheme of Cluster VPN Gateway 14 2.5 Discussions 18 Chapter 3 Proposed Reconfigurable VPN Gateway via Adaptive Clustering 19 3.1 System Architecture 19 3.2 System Overview 21 3.3 Initial Setup 24 3.4 Heartbeat mechanism 25 3.5 Traffic Dispatching 26 3.6 Virtual Gateway Migration 27 3.7 Resource Management 29 3.8 Summary 31 Chapter 4 Implementation and Evaluation 32 4.1 Implementation and Test Environment 32 4.2 Zero-Loss Throughput 35 4.3 Load Sharing Effect 36 4.4 Reconfiguration of the Cluster 38 4.4.1 Node Joining 38 4.4.2 Node Leaving or Node Failure 41 4.4.3 Node Joining and Leaving 43 Chapter 5 Conclusions 46 5.1 Discussions 46 5.2 Future Work 47 Reference 48 | |
| dc.language.iso | en | |
| dc.subject | 虛擬私用網路 | zh_TW |
| dc.subject | 可重組 | zh_TW |
| dc.subject | 叢集 | zh_TW |
| dc.subject | 容錯 | zh_TW |
| dc.title | 可重組化叢集式虛擬私用網路閘道器之設計與實作 | zh_TW |
| dc.title | Design and Implementation of a Reconfigurable VPN Gateway via Adaptive Clustering | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 93-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 黃寶儀(Polly Huang),范俊逸(Chun-I Fan),王旭正(Shiuh-Jeng Wang) | |
| dc.subject.keyword | 虛擬私用網路,容錯,可重組,叢集, | zh_TW |
| dc.subject.keyword | VPN,fault tolerance,reconfiguration,cluster, | en |
| dc.relation.page | 49 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2005-07-13 | |
| dc.contributor.author-college | 電機資訊學院 | zh_TW |
| dc.contributor.author-dept | 電機工程學研究所 | zh_TW |
| 顯示於系所單位: | 電機工程學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-94-1.pdf 未授權公開取用 | 639.21 kB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
