Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 電機工程學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/38254
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor雷欽隆(Chin-Laung Lei)
dc.contributor.authorSiong-Ui Teen
dc.contributor.author戴上為zh_TW
dc.date.accessioned2021-06-13T16:28:52Z-
dc.date.available2005-07-19
dc.date.copyright2005-07-19
dc.date.issued2005
dc.date.submitted2005-07-13
dc.identifier.citation[1] S. Ortiz Jr., 'Virtual Private Networks: Leveraging the Internet,' IEEE Computer, Vol. 30, No. 11, pp. 18-20, November 1997.
[2] S. Kent and R. Atkinson, 'Security Architecture for the Internet Protocol,' RFC 2401, No-vember 1998.
[3] P. Knight and C. Lewis, 'Layer 2 and 3 Virtual Private Networks: Taxonomy, Technology, and Standardization Efforts,' IEEE Communications Magazine, Vol. 42, No. 6, pp. 124-131, June 2004.
[4] O. Elkeelany, M. M. Matalgah, K. P. Sheikh, M. Thaker, G. Chaudhry, D. Medhi, and J. Qaddour, 'Performance Analysis of IPSec Protocol: Encryption and Authentication,' Pro-ceedings of 2002 IEEE International Conference on Communications (ICC 2002), Vol. 2, pp. 1164-1168, April 2002.
[5] J.-C. Lin, C.-T. Chang, and W.-T. Chung, 'Design, Implementation and Performance Evaluation of IP-VPN,' Proceedings of 17th International Conference on Advanced Infor-mation Networking and Applications (AINA 2003), pp. 206-209, March 2003.
[6] S. Khanvilkar and A. Khokhar, 'Virtual Private Networks: An Overview with Performance Evaluation,' IEEE Communications Magazine, Vol. 42, No. 10, pp. 146-154, October 2004.
[7] D. Kettler, H. Kafka, and D. Spears, 'Driving Fiber to the Home,' IEEE Communications Magazine, Vol. 38, No. 11, pp. 106-110, November 2000.
[8] C. Metz, 'The Latest in Virtual Private Networks: Part I,' IEEE Internet Computing, Vol. 7, No. 1, pp. 87-91, January/February 2003.
[9] C. Metz, 'The Latest in Virtual Private Networks: Part II,' IEEE Internet Computing, Vol. 8, No. 3, pp. 60-65, May/June 2003.
[10] M. Carugi and J. De Clercq, 'Virtual Private Network Services: Scenarios, Requirements and Architectural Constructs from a Standardization Perspective,' IEEE Communications Magazine, Vol. 42, No. 6, pp. 116-122, June 2004.
[11] J. De Clercq and O. Paridaens, 'Scalability Implications of Virtual Private Networks,' IEEE Communications Magazine, Vol. 40, No. 5, pp. 151-157, May 2002.
[12] B. Devlin, J. Gray, B. Laing, and G. Spix, 'Scalability Terminology: Farms, Clones, Parti-tions, and Packs: RACS and RAPS,' Microsoft Research Technical Report MS-TR-99-85, December 1999.
[13] A. Hodjat and I. Verbauwhede, 'High-Throughput Programmable Cryptocoprocessor,' IEEE Micro, Vol. 24, No. 3, pp. 34-45, May/June 2004.
[14] C.-S. Ha, J.-H. Lee, D.-S. Leem, M.-S. Park, and B.-Y. Choi, 'ASIC Design of IPSec Hardware Accelerator for Network Security,' Proceedings of 2004 IEEE Asia-Pacific Con-ference on Advanced System Integrated Circuits (AP-ASIC 2004), pp. 168-171, August 2004.
[15] R. Friend, 'Making the Gigabit IPsec VPN Architecture Secure,' IEEE Computer, Vol. 37, No. 6, pp. 54-60, June 2004.
[16] Y.-N. Lin, C.-H. Lin, Y.-D. Lin, and Y.-C. Lai, 'VPN Gateways over Network Processors: Implementation and Evaluation,' Proceedings of 11th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2005), pp. 480-486, March 2005.
[17] Intel(R) Corporation, 'Intel(R) IXP425 Network Processor,' http://www.intel.com/design/network/products/npfamily/ixp425.htm.
[18] The Tolly Group, 'Intel(R) IXP425 Network Processors: Performance Analysis of VPN De-vices,' Document No. 204132, July 2004.
[19] M. Han, J. Kim, and S. Sohn, 'Network Processor for IPSec,' Proceedings of 6th Interna-tional Conference on Advanced Communication Technology (ICACT 2004), Vol. 1, pp. 485-487, February 2004.
[20] D. E. Comer, Network Systems Design Using Network Processors, Prentice Hall, ISBN: 0-13-141792-4, January 2003.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/38254-
dc.description.abstract這篇論文在叢集式虛擬私用網路閘道器的基礎上,提出可重組化之叢集式虛擬私用網路閘道器。在不停止虛擬私用網路服務的前提下,此設計能動態地增加或減少叢集閘道器內機器。同時也達成了容錯的目標。除了可重組化外,此叢集閘道器同時也有負載分享的機制,可以將負載分攤到各台機器上,避免造成機器負載過重的情形。最後從實作及評估的圖表中,驗證所提出的方案正確性。zh_TW
dc.description.abstractBased on the VPN gateway using cluster, a reconfigurable VPN gateway via adaptive clustering is proposed in the thesis. Without stopping the VPN service, the proposed VPN gateway can dynamically add or delete a node in the cluster. Reconfiguration of the gateway also implies fault tolerance of the gateway. In addition to reconfiguration, there is also load sharing mechanism in the VPN gateway. The mechanism can share load to each node in the cluster and avoid overloaded nodes in the cluster. Finally, correctness of the proposed gateway is verified from implementation and evaluation figures.en
dc.description.provenanceMade available in DSpace on 2021-06-13T16:28:52Z (GMT). No. of bitstreams: 1
ntu-94-R92921023-1.pdf: 654551 bytes, checksum: 928fbb6e8278cdc5354cb78e984c63ad (MD5)
Previous issue date: 2005
en
dc.description.tableofcontentsChapter 1 Introduction 1
1.1 VPN Technology 1
1.2 VPN Gateway via Clustering 5
1.3 Reconfiguration of VPN Gateway via Clustering 6
1.4 Thesis Organization 8
Chapter 2 Related Work 9
2.1 System Architecture 9
2.2 Traffic Dispatching Technique 12
2.3 Traffic Redistribution Technique 12
2.4 The Scheme of Cluster VPN Gateway 14
2.5 Discussions 18
Chapter 3 Proposed Reconfigurable VPN Gateway via Adaptive Clustering 19
3.1 System Architecture 19
3.2 System Overview 21
3.3 Initial Setup 24
3.4 Heartbeat mechanism 25
3.5 Traffic Dispatching 26
3.6 Virtual Gateway Migration 27
3.7 Resource Management 29
3.8 Summary 31
Chapter 4 Implementation and Evaluation 32
4.1 Implementation and Test Environment 32
4.2 Zero-Loss Throughput 35
4.3 Load Sharing Effect 36
4.4 Reconfiguration of the Cluster 38
4.4.1 Node Joining 38
4.4.2 Node Leaving or Node Failure 41
4.4.3 Node Joining and Leaving 43
Chapter 5 Conclusions 46
5.1 Discussions 46
5.2 Future Work 47
Reference 48
dc.language.isoen
dc.subject虛擬私用網路zh_TW
dc.subject可重組zh_TW
dc.subject叢集zh_TW
dc.subject容錯zh_TW
dc.title可重組化叢集式虛擬私用網路閘道器之設計與實作zh_TW
dc.titleDesign and Implementation of a Reconfigurable VPN Gateway via Adaptive Clusteringen
dc.typeThesis
dc.date.schoolyear93-2
dc.description.degree碩士
dc.contributor.oralexamcommittee黃寶儀(Polly Huang),范俊逸(Chun-I Fan),王旭正(Shiuh-Jeng Wang)
dc.subject.keyword虛擬私用網路,容錯,可重組,叢集,zh_TW
dc.subject.keywordVPN,fault tolerance,reconfiguration,cluster,en
dc.relation.page49
dc.rights.note有償授權
dc.date.accepted2005-07-13
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept電機工程學研究所zh_TW
顯示於系所單位:電機工程學系

文件中的檔案:
檔案 大小格式 
ntu-94-1.pdf
  未授權公開取用
639.21 kBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved