The search functionality is under construction.

Author Search Result

[Author] Masaki FUKUSHIMA(5hit)

1-5hit
  • Modeling of Seamless Interworking Environments for Heterogeneous Mobile Systems

    Masaki FUKUSHIMA  Hajime NAKAMURA  Shinichi NOMOTO  Yu WATANABE  

     
    PAPER-Terrestrial Radio Communications

      Vol:
    E89-B No:10
      Page(s):
    2885-2896

    In future systems beyond IMT-2000, macrocell cellular systems such as the 3G systems and high bandwidth microcell wireless systems such as Wireless LAN will complement one another. Routing in the systems beyond IMT-2000 will support seamless inter- and intra-system handover among the cellular and WLAN systems by maintaining active connections. Under such environments, the time scales of mobility and bandwidth-sharing behavior cannot be easily separated. It is not obvious what fraction of traffic is accommodated by each cellular and WLAN system, i.e. the traffic distribution is unknown. This paper shows the considerable impacts the mobility of users has on the capacities of the systems beyond IMT-2000 with roaming capability between different bit rate systems. Especially, this paper demonstrates that the traffic distribution among different systems is a major factor in defining total network throughput. We also provide an analytical method to determine the traffic distribution based on the theory of queueing networks.

  • Efficient Lookup Scheme for Non-aggregatable Name Prefixes and Its Evaluation Open Access

    Masaki FUKUSHIMA  Atsushi TAGAMI  Toru HASEGAWA  

     
    PAPER

      Vol:
    E96-B No:12
      Page(s):
    2953-2963

    Content-Centric Networking (CCN) employs a hierarchical but location independent content naming scheme. While such a location independent naming brings various benefits including efficient content delivery, mobility, and multihoming, location independent name prefixes are hard to aggregate. This poses a serious scaling issue on the efficiency of looking up content names in a huge Forwarding Information Base (FIB) by longest prefix matching, which requires seeking the longest matching prefix through all candidate prefix lengths. We propose a new scheme for efficiently looking up non-aggregatable name prefixes in a large FIB. The proposed scheme is based on the observation that the bottleneck of FIB lookup is the random accesses to the high-latency off-chip DRAM for prefix seeking and this can be reduced by exploiting the information on the longest matching prefix length in the previous hop. Our evaluation results show that the proposed scheme significantly improves FIB lookup latency with a reasonable traffic parameters observed in today's Internet.

  • An Improved TCP Protocol Machine for Flow Analysis and Network Monitoring

    Heshmatollah KHOSRAVI  Masaki FUKUSHIMA  Shigeki GOTO  

     
    PAPER-Traffic Monitoring and Evaluation

      Vol:
    E86-B No:2
      Page(s):
    595-603

    In the Internet, flow analysis and network monitoring have been studied by various methods. Some methods try to make TCP (Transport Control Protocol) traces more readable by showing them graphically. Others such as MRTG, NetScope, and NetFlow read the traffic counters of the routers and record the data for traffic engineering. Even if all of the above methods are useful, they are made only to perform a single task. This paper describes an improved TCP Protocol Machine, a multipurpose tool that can be used for flow analysis, intrusion detection and link congestion monitoring. It is developed based on a finite state machine (automaton). The machine separates the flows into two main groups. If a flow can be mapped to a set of input symbols of the automaton, it is valid, otherwise it is invalid. It can be observed that intruders' attacks are easily detected by the use of the protocol machine. Also link congestion can be monitored, by measuring the percentage of valid flows to the total number of flows. We demonstrate the capability of this tool through measurement and working examples.

  • Analysis of TCP Flags in Congested Network

    Masaki FUKUSHIMA  Shigeki GOTO  

     
    PAPER

      Vol:
    E83-D No:5
      Page(s):
    996-1002

    This paper proposes a new simple method for network measurement. It extracts 6-bit control flags of TCP (Transmission Control Protocol) packets. The idea is based on the unique feature of flag ratios which is discovered by our exhaustive search for the new indexes of network traffic. By the use of flag ratios, one can tell if the network is really congested. It is much simpler than the conventional network monitoring by a network analyzer. The well-known monitoring method is based on the utilization parameter of a communication circuit which ranges from 0% to 100%. One cannot tell the line is congested even if the factor is 100%. 100% means full utilization and does not give any further information. To calculate the real performance of the network, one should estimate the throughput or effective speed of each user. The estimation needs much calculation. Our new method tries to correlate ratios of TCP control flags and network congestion. The result shows the usefulness of this new method. This paper analyzes the reason why the flag ratios show the unique feature.

  • Modeling of Aggregated TCP/IP Traffic on a Bottleneck Link Based on Scaling Behavior

    Hiroki FURUYA  Masaki FUKUSHIMA  Hajime NAKAMURA  Shinichi NOMOTO  

     
    PAPER-Internet

      Vol:
    E85-B No:9
      Page(s):
    1756-1765

    This paper proposes an idea for modeling aggregated TCP/IP traffic arriving at a bottleneck link by focusing on its scaling behavior. Here, the aggregated TCP/IP traffic means the IP packet traffic from many TCP connections sharing the bottleneck link. The model is constructed based on the outcomes of our previous works investigating how the TCP/IP networking mechanism affects the self-similar scaling behavior of the aggregated TCP/IP traffic in a LAN/WAN environment. The proposed traffic model has been examined from the perspective of application to network performance estimation. The examinations have shown that it models the scaling behavior and queueing behavior of actual traffic, though it neglects the interaction among TCP connections that compete with each other for the single bottleneck link bandwidth.