請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/49902完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 周承復 | |
| dc.contributor.author | Yuan-Ting Huang | en |
| dc.contributor.author | 黃元廷 | zh_TW |
| dc.date.accessioned | 2021-06-15T12:25:56Z | - |
| dc.date.available | 2016-08-24 | |
| dc.date.copyright | 2016-08-24 | |
| dc.date.issued | 2016 | |
| dc.date.submitted | 2016-08-10 | |
| dc.identifier.citation | [1] A. Anand, A. Gupta, A. Akella, S. Seshan, and S. Shenker. Packet caches on routers: the implications of universal redundant traffic elimination. In ACM SIGCOMM Computer Communication Review, volume 38, pages 219–230. ACM, 2008.
[2] J. W. Anderson, R. Braud, R. Kapoor, G. Porter, and A. Vahdat. xomb: extensible open middleboxes with commodity servers. In Proceedings of the eighth ACM/IEEE symposium on Architectures for networking and communications systems, pages 49–60. ACM, 2012. [3] M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. McKeown, and S. Shenker. Ethane: taking control of the enterprise. In ACM SIGCOMM Computer Communication Review, volume 37, pages 1–12. ACM, 2007. [4] U. S. computer networking consortium. Internet2. http://www.internet2.edu. [5] S. K. Fayazbakhsh, L. Chiang, V. Sekar, M. Yu, and J. C. Mogul. Enforcing networkwide policies in the presence of dynamic middlebox actions using flowtags. In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14), pages 543–546, 2014. [6] A. Feldmann, A. Greenberg, C. Lund, N. Reingold, J. Rexford, and F. True. Deriving traffic demands for operational ip networks: Methodology and experience. IEEE/ACM Transactions on Networking (ToN), 9(3):265–280, 2001. [7] A. Gember, A. Krishnamurthy, S. S. John, R. Grandl, X. Gao, A. Anand, T. Benson, V. Sekar, and A. Akella. Stratos: A network-aware orchestration layer for virtual middleboxes in clouds. arXiv preprint arXiv:1305.0209, 2013. [8] A. Gember, P. Prabhu, Z. Ghadiyali, and A. Akella. Toward software-defined middlebox networking. In Proceedings of the 11th ACM Workshop on Hot Topics in Networks, pages 7–12. ACM, 2012. [9] P. Gill, N. Jain, and N. Nagappan. Understanding network failures in data centers: measurement, analysis, and implications. In ACM SIGCOMM Computer Communication Review, volume 41, pages 350–361. ACM, 2011. [10] N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker. Nox: towards an operating system for networks. ACM SIGCOMM Computer Communication Review, 38(3):105–110, 2008. [11] D. A. Joseph, A. Tavakoli, and I. Stoica. A policy-aware switching layer for data centers. In ACM SIGCOMM Computer Communication Review, volume 38, pages 51–62. ACM, 2008. [12] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner. Openflow: enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review, 38(2):69–74, 2008. [13] Z. A. Qazi, C.-C. Tu, L. Chiang, R. Miao, V. Sekar, and M. Yu. Simple-fying middlebox policy enforcement using sdn. In ACM SIGCOMM Computer Communication Review, volume 43, pages 27–38. ACM, 2013. [14] P. Quinn, J. Guichard, S. Kumar, P. Agarwal, R. Manur, A. Chauhan, N. Leyman, M. Boucadir, C. Jacquenet, M. Smith, et al. Network service chaining problem statement. Working Draft, IETF Secretariat, Internet-Draft draftquinn-nsc-problemstatement- 03, 2013. [15] V. Sekar, N. Egi, S. Ratnasamy, M. K. Reiter, and G. Shi. Design and implementation of a consolidated middlebox architecture. In Presented as part of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12), pages 323–336, 2012. [16] V. Sekar, S. Ratnasamy, M. K. Reiter, N. Egi, and G. Shi. The middlebox manifesto: enabling innovation in middlebox deployment. In Proceedings of the 10th ACM Workshop on Hot Topics in Networks, page 21. ACM, 2011. [17] J. Sherry, S. Hasan, C. Scott, A. Krishnamurthy, S. Ratnasamy, and V. Sekar. Making middleboxes someone else’s problem: network processing as a cloud service. ACM SIGCOMM Computer Communication Review, 42(4):13–24, 2012. [18] . W. C. W. site. Worldcup website pcap file. http://www.fifa.com/worldcup/archive/france1998/. [19] M. Team. Mininet: An instant virtual network on your laptop (or other pc), 2012. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/49902 | - |
| dc.description.abstract | 中間件在軟體定義網路中扮演重要的角色,可以協助提供網路安全及提升網路傳輸效能等。在軟體定義網路中,控制層需有整個網路的全局資訊以便作路由決策,然而中間件在提供額外的服務時,往往不會將內部對資料流所作的處理方法公開出來,因此當資料流經中間件後,控制層喪失了此資料流完整的資訊,無法對此資料流作路由決策。此外,網路架構中中間件數量龐大,根據研究顯示,中間件的擺放位置會造成資料層下網路設備的路由表有迴圈的情形發生。我們提出了名為FastLabel的架構,此架構以多重通訊協定標籤交換傳輸(Multi-Protocol Label Switching,縮寫為MPLS)為基礎的方式,並額外在封包的VLAN標頭中嵌入特定標籤,在不用改動到中間件及現有的網路設備下,讓控制層能夠得知中間件不願公開的內部規則,並同時解決中間件所造成的路由迴圈問題,讓控制層對每個資料流從發出端到接送端整個路徑上所經過的處理都能完全的掌控,能夠因此下達正確的路由決策。實驗結果顯示,我們的方法在路由決策設定完成的時間能夠比其他方法快約37%,同時不會造成控制層與中間件過大的負擔。 | zh_TW |
| dc.description.abstract | Middleboxes play a critical role in software defined network (SDN) to ensure network security and to reduce network transmission overhead. A controller in SDN needs whole network information for inserting right forwarding rules in switches. However, due to the proprietary nature of middleboxes, a SDN controller may have limited visibility to set up forwarding rules that account for intern transformations of middleboxes. Besides, surveys show that the placement of middleboxes may cause conflicting rules in switches.In response we develop a FastLabel architecture. FastLabel is an tagging method based on MPLS which is used to forward packets and find inter transformations middleboxes want to hide. In addition, we insert a tag into VLAN field for solving conflicted rules caused by the placements of middleboxes. Our method makes controller know whole network information without modifying middleboxes and switches. The experiment shows that our method is 34% faster than other works for inserting forwarding rules into switches, less controller overhead and less middlebox overhead. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-15T12:25:56Z (GMT). No. of bitstreams: 1 ntu-105-R03922033-1.pdf: 1106604 bytes, checksum: 98b2585a7293ec4abd07e5ddcecc41af (MD5) Previous issue date: 2016 | en |
| dc.description.tableofcontents | 致謝iii
摘要iv Abstract v 1 Introduction 1 1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.2.1 ORIGINBINDING . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.2.2 PATHSFOLLOWPOLICY . . . . . . . . . . . . . . . . . . . . . 3 2 Related Work 7 2.1 Placement Constraint . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.2 Middlebox Modification . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2.3 Flow Correlation by Payload . . . . . . . . . . . . . . . . . . . . . . . . 8 2.4 Middlebox Consolidation . . . . . . . . . . . . . . . . . . . . . . . . . . 9 2.5 Tunneling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3 Framework 11 3.1 System overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 3.2 Rule Generator Module . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 3.3 MPLS Setter Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.4 Source Binder Module . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 4 Evaluation 21 4.1 Small Scale Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 4.1.1 Time to Install Rules . . . . . . . . . . . . . . . . . . . . . . . . 22 4.1.2 Controller Overhead . . . . . . . . . . . . . . . . . . . . . . . . 24 4.1.3 Middlebox Overhead . . . . . . . . . . . . . . . . . . . . . . . . 25 4.1.4 ORIGINBINDING Accuracy . . . . . . . . . . . . . . . . . . . 26 4.2 Large Scale Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 4.2.1 Time to Install Rules . . . . . . . . . . . . . . . . . . . . . . . . 28 4.2.2 Controller/Middlebox Overhead . . . . . . . . . . . . . . . . . . 30 4.3 Controller and Middlebox Overhead Formulation . . . . . . . . . . . . . 31 4.3.1 Number of Middleboxes/Switches Influence . . . . . . . . . . . . 32 5 Future Work 34 5.0.1 Multi-controller Scenario . . . . . . . . . . . . . . . . . . . . . . 34 5.0.2 Reusing MPLS Label Wisely . . . . . . . . . . . . . . . . . . . . 35 5.0.3 Reducing Controller Storage Overhead . . . . . . . . . . . . . . 35 6 Conclusion 36 Bibliography 37 | |
| dc.language.iso | en | |
| dc.subject | 中間件 | zh_TW |
| dc.subject | 軟體定義網路 | zh_TW |
| dc.subject | 路由迴圈 | zh_TW |
| dc.subject | 多重通訊協定標籤交換傳輸 | zh_TW |
| dc.subject | middleboxes | en |
| dc.subject | conflicting rules | en |
| dc.subject | MPLS | en |
| dc.subject | software defined network | en |
| dc.title | 以多重通訊協定標籤交換傳輸為基礎解決中間件服務鏈佈署於軟體定義網路中之問題 | zh_TW |
| dc.title | Using MPLS Based Solution for Middlebox Policy Enforcement in Software Defined Network | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 104-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 林俊宏,吳曉光,呂政修,蔡子傑 | |
| dc.subject.keyword | 中間件,軟體定義網路,多重通訊協定標籤交換傳輸,路由迴圈, | zh_TW |
| dc.subject.keyword | middleboxes,software defined network,MPLS,conflicting rules, | en |
| dc.relation.page | 39 | |
| dc.identifier.doi | 10.6342/NTU201602213 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2016-08-11 | |
| dc.contributor.author-college | 電機資訊學院 | zh_TW |
| dc.contributor.author-dept | 資訊工程學研究所 | zh_TW |
| 顯示於系所單位: | 資訊工程學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-105-1.pdf 未授權公開取用 | 1.08 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
