Kazuhito MATSUDA Go HASEGAWA Masayuki MURATA
Content-Centric Networking (CCN) has an in-network caching mechanism, which can reduce the traffic volume along the route to the destination host. This traffic volume reduction on the transit link can decrease inter-ISP transit cost. However, the memory space for caching in CCN routers is small relative to content volume. In addition, any initial access to the content requested by a user must use the transit link, even when a nearby CCN router outside the route has the cached content. In this paper, we propose a method of cooperative cache sharing among CCN routers in multiple ISPs. It aims to attain a further reduction in the inter-ISP transit cost by improving the cache hit ratio. In the proposed method, the CCN routers share the memory space for caching of non-overlapping cache content. We evaluate the proposed method by simulation experiments using the IP-level network topology of actual ISP, and show that the inter-ISP transit traffic can be reduced by up to 28% compared with normal caching behavior of CCN.
Keiichi TAKAGAKI Hiroyuki OHSAKI Masayuki MURATA
A feedback-based congestion control mechanism is essential to realize an efficient data transfer service in packed-switched networks. TCP (Transmission Control Protocol) is a feedback-based congestion control mechanism, and has been widely used in the current Internet. An improved version of TCP called TCP Vegas has been proposed and studied in the literature. It can achieve better performance than TCP Reno. In previous studies, performance analysis of a window-based flow control mechanism based on TCP Vegas only for a simple network topology has been performed. In this paper, we extend the analysis to a generic network topology where each connection is allowed to have a different propagation delay and to traverse multiple bottleneck links. We first derive equilibrium values of window sizes of TCP connections and the number of packets waiting in a router's buffer. We also derive throughput of each TCP connection in steady state, and investigate the effect of control parameters of TCP Vegas on fairness among TCP connections. We then present several numerical examples, showing how control parameters of TCP Vegas should be configured for achieving both stability and better transient performance.
Takahiro HIRAYAMA Shin'ichi ARAKAWA Ken-ichi ARAI Masayuki MURATA
Internet behavior is becoming more complex due to ever-changing networking technologies and applications. Thus, understanding and controlling the complex behavior of the Internet are important for designing future networks. One of the complex behaviors of the Internet is traffic dynamics. Previous studies revealed that flow control in the transport layer affects the traffic dynamics of the Internet. However, it is not clear how the topological structure impacts traffic dynamics. In this paper, we investigate packet delay dynamics and traffic fluctuation in ISP router-level topologies where the degree distribution exhibits a power-law nature, and the nodes interact via end-to-end feedback control functionality. We show the packet delay dynamics of the BA topologies generated by the Barabasi-Albert (BA) model and the ISP router-level topologies. Simulation results show that the end-to-end delay distributions exhibit a heavy tail in the TCP model. Moreover, the number of links with highly fluctuating queue length increases dramatically compared to that in the stop-and-wait model. Even in this case, the high-modularity structures of the ISP topologies reduce the number of highly fluctuating links compared with the BA topologies.
Yusuke SAKUMOTO Chisa TAKANO Masaki AIDA Masayuki MURATA
Computer networks require sophisticated control mechanisms to realize fair resource allocation among users in conjunction with efficient resource usage. To successfully realize fair resource allocation in a network, someone should control the behavior of each user by considering fairness. To provide efficient resource utilization, someone should control the behavior of all users by considering efficiency. To realize both control goals with different granularities at the same time, a hierarchical network control mechanism that combines microscopic control (i.e., fairness control) and macroscopic control (i.e., efficiency control) is required. In previous works, Aida proposed the concept of chaos-based hierarchical network control. Next, as an application of the chaos-based concept, Aida designed a fundamental framework of hierarchical transmission rate control based on the chaos of coupled relaxation oscillators. To clarify the realization of the chaos-based concept, one should specify the chaos-based hierarchical transmission rate control in enough detail to work in an actual network, and confirm that it works as intended. In this study, we implement the chaos-based hierarchical transmission rate control in a popular network simulator, ns-2, and confirm its operation through our experimentation. Results verify that the chaos-based concept can be successfully realized in TCP/IP networks.
Changhwan OH Masayuki MURATA Hideo MIYAHARA
A circuit emulation technique in the ATM network becomes necessary to guarantee user requirements similar to QOS grade offered by STM network where small bit error rates and constant delay times are offered. The Head-Of-Line method or other priority control schemes may be considered to provide such service in the ATM network, while it is known to give too inferior quality to non-circuit emulation service traffic. In this paper, we propose a new method called a periodical bandwidth allocation method for the circuit emulation technique. The cells of circuit emulation service traffic are transmitted periodically in our proposal. A periodical interval is determined from both the length of limit delay time of circuit emulation traffic in each switching node and the number of cell arrivals during the limit delay time. To evaluate our method, we consider three kinds of arrival patterns (the best case, the moderate case, and the worst case) for the circuit emulation traffic and a two-state MMPP for modeling the non-circuit emulation traffic. We show performance results in terms of the cell loss probability and the mean delay time in our proposal through analytic and simulation approaches.
Yoshitaka OHTAKI Naoki WAKAMIYA Masayuki MURATA Makoto IMASE
Ants-based routing algorithms have attracted the attention of researchers because they are more robust, reliable, and scalable than other conventional routing algorithms. Since they do not involve extra message exchanges to maintain paths when network topology changes, they are suitable for mobile ad-hoc networks where nodes move dynamically and topology changes frequently. As the number of nodes increases, however, the number of ants (i.e., mobile agents or control messages) also increases, which means that existing algorithms have poor scalability. In this paper, we propose a scalable ant-based routing algorithm that keeps the overhead low while keeping paths short. Our algorithm uses a multistep TTL (Time To Live) scheme, an effective message migration scheme, and an efficient scheme for updating the probability of packet forwarding. Simulation experiments have confirmed that our proposed algorithm can establish shorter paths than the conventional ant-based algorithm with the same signaling overhead.
Shin'ichi ARAKAWA Masayuki MURATA Hideo MIYAHARA
A WDM (Wavelength Division Multiplexing) technology is a new optical technology, providing multiple wavelengths at the rate of 10 Gbps on the fiber. IP (Internet Protocol) over WDM networks where IP packets are directly carried on the WDM network is expected to offer an infrastructure for the next generation Internet. For IP over WDM networks, a WDM protection mechanism is expected to provide a highly reliable network (i.e., robustness against the link/node failures). However, conventional IP also provides a reliability mechanism by its routing function. In this paper, we first formulate an optimization problem for designing IP over WDM networks with protection functionalities of WDM networks, by which we can obtain IP over WDM networks with high reliability. Our formulation results in a mixed integer linear problem (MILP). However, it is known that MILP can be solved only for a small number of variables, in our case, nodes and/or wavelengths. We therefore propose two heuristic algorithms, min-hop-first and largest-traffic-first approaches in order to assign the wavelength for backup lightpath. Our results show that the min-hop-first approach takes fewer wavelengths to construct the reliable network, that is, all of lightpaths can be protected using the WDM protection mechanism. However, our largest-traffic-first approach is also a good choice in the sense that the approach can be saved the traffic volume increased at the IP router by the link failure.
Masahiro MIYOSHI Masashi SUGANO Masayuki MURATA
We propose a new adaptive FEC scheme combined with ELN (Explicit Loss Notification) that was proposed for improving TCP performance in wireless cellular networks. In our method, transmission errors on the wireless link are measured at the packet level and the error status is notified the TCP sender with ELN. According to this information, an appropriate FEC code is determined in order to maximize the TCP performance. We first compare the TCP performance using Snoop Protocol, ELN and the fixed FEC, through which we find the appropriate FEC code against given BER (bit error ratio). We then show how the adaptive FEC can be realized using our solution, and also examine the appropriate observation period of measuring BER enough for the fading speed on the noisy wireless link. We finally demonstrate that our method can achieve better performance than the conventional fixed FEC by using the Gilbert model as a wireless error model.
Masayuki MURATA Hideo MIYAHARA
A local area network (LAN) can now provide high-speed data communications in a local area environment to establish distributed processing among personal computers and workstations, and the need for interconnecting LANs, which are geographically distributed, is naturally arising. Asynchronous Transfer Mode (ATM) technology has been widely recognized as a promising way to provide the high-speed wide area networks (WAN) for Broadband Integrated Services Digital Network (B-ISDN), and the commercial service offerings are expected in the near future. The ATM network seems to have a capability as a backbone network for interconnecting LANs, and the LAN interconnection is expected to be the first service in ATM networks. However, there remain some technical challenges for this purpose; one of the main difficulties in LAN interconnection is the support of connectionless traffic by the ATM network, which is basically a connection-oriented network. Another one is the way of achieving the very high-speed data transmission over the ATM network. In this paper, we first discuss a LAN internetworking methodology based on the current technology. Then, the recent deployments of LAN interconnection methods through B-ISDN are reviewed.
Kazumine MATOBA Shingo ATA Masayuki MURATA
Network dimensioning is an important issue to provide stable and QoS-rich communication services. A reliable estimation of bandwidths of links between the end-to-end path is a first step towards the network dimensioning. Pathchar is one of such tools for the bandwidth estimation for every link between two end hosts. However, pathchar still has several problems. If unexpectedly large errors are included or if route alternation is present during the measurement, the obtained estimation is much far from the correct one. We investigate the method to eliminate those errors in estimating the bandwidth. To increase the reliability on the estimation, the confidence interval for the estimated bandwidth is important. For this purpose, two approaches, parametric and nonparametric approaches, are investigated to add the confidence intervals. Another important issue is the method for controlling the measurement period to eliminate the measurement overheads. In this paper, we propose a measurement method to adaptively control the number of measurement data sets. Through experimental results, we show that our statistical approaches can provide the robust estimation regardless of the network conditions.
Byung Han RYU Hiroyuki OHSAKI Masayuki MURATA Hideo MIYAHAEA
An ATM network design algorithm is treated as a resource allocation problem. As an effective way to facilitate a coexistence of traffic with its diverse characteristics and different quality of service (QOS) requirements in ATM networks, a virtual path (VP) concept has been proposed. In attempting to design the VP (Virtual Path)-based ATM network, it requires to consider a network topology and traffic pattern generated from users for minimizing a network construction cost while satisfying QOS requirements such as cell / call loss probabilities and cell delay times. In this paper, we propose a new heuristic design algorithm for the VP-based ATM network under QOS constraints. A minimum bandwidth required to transfer a given amount of traffic is first obtained by utilizing an equivalent bandwidth method. After all the routes of VPs are temporarily established by means of the shortest paths, we try to minimize the network cost through the alternation of VP route, the separation of a single VP into several VPs, and the introduction of VCX nodes. To evaluate our design algorithm, we consider two kinds of traffic; voice traffic as low speed service and still picture traffic as high speed service. Through numerical examples, we demonstrate that our design method can achieve an efficient use of network resources, which results in the cost-effective VP-based ATM network.
Junichi MARUYAMA Go HASEGAWA Masayuki MURATA
In this paper, we propose new methods which detect tampered-TCP connections at edge routers and protect well-behaved TCP connections from tampered-TCP connections, which results in fairness among TCP connections. The proposed methods monitor the TCP packets at an edge router and estimate the window size or the throughput for each TCP connection. By using estimation results, the proposed methods assess whether each TCP connection is tampered or not and drop packets intentionally if necessary to improve the fairness amongst TCP connections. From the results of simulation experiments, we confirm that the proposed methods can accurately identify tampered-TCP connections and regulate throughput ratio between tampered-TCP connections and competing TCP Reno connections to about 1.
Haesung HWANG Shingo ATA Koji YAMAMOTO Kazunari INOUE Masayuki MURATA
Ternary Content Addressable Memory (TCAM) is a special type of memory used in routers to achieve high-speed packet forwarding and classification. Packet forwarding is done by referring to the rules written in the routing table, whereas packet classification is performed by referring to the rules in the Access Control List (ACL). TCAM uses more transistors than Random Access Memory (RAM), resulting in high power consumption and high production cost. Therefore, it is necessary to reduce the entries written in the TCAM to reduce the transistor count. In this paper, we propose a new TCAM architecture by using Range Matching Devices (RMD) integrated within the TCAM's control logic with an optimized prefix expansion algorithm. The proposed method reduces the number of entries required to express ACL rules, especially when specifying port ranges. With less than 10 RMDs, the total number of lines required to write port ranges in the TCAM can be reduced to approximately 50%.
Kazuhito MATSUDA Go HASEGAWA Masayuki MURATA
Application-level routing that chooses an end-to-end traffic route that relays other end hosts can improve user-perceived performance metrics such as end-to-end latency and available bandwidth. However, selfish route selection performed by each end user can lead to a decrease in path performance due to overload by route overlaps, as well as an increase in the inter-ISP transit cost as a result of utilizing more transit links compared with native IP routing. In this paper, we first strictly define an optimization problem for selecting application-level traffic routes with the aim of maximizing end-to-end network performance under a transit cost constraint. We then propose an application-level traffic routing method based on distributed simulated annealing to obtain good solutions to the problem. We evaluate the performance of the proposed method by assuming that PlanetLab nodes utilize application-level traffic routing. We show that the proposed routing method can result in considerable improvement of network performance without increasing transit cost. In particular, when using end-to-end latency as a routing metric, the number of overloaded end-to-end paths can be reduced by about 65%, as compared with that when using non-coordinated methods. We also demonstrate that the proposed method can react to dynamic changes in traffic demand and select appropriate routes.
Naoki WAKAMIYA Masayuki MURATA Hideo MIYAHARA
We propose burst based bandwidth reservation method called FRP (Fast Reservation Protocol) in ATM LAN with general topology, and evaluate its performance. In FRP, the bandwidth is allocated on each link on burst basis, not on call basis. This enables an effective use of network resources when it is applied to highly bursty traffic, which can be typically found in data communications. The problem of FRP is that VCs traversing the different number of links experience different blocking probabilities as can be found in the conventional circuit-switching networks. In this paper, we treat a fairness issue in FRP-based ATM local area networks. The Max-Min flow control is adopted as the fair bandwidth allocation method to accomplish the fairness in the throughput. However, the original Max-Min flow control works in a centralized fashion, which is not desirable in the FRP-based ATM LAN. We therefore propose a "semi"-distributed Max-Min flow control suitable to FRP, in which each switch maintains its own local information about bandwidth usage of the connected links. Through simulation experiments, we show that the proposed semi-distributed Max-Min flow control can achieve the fairness among VCs as the original Max-Min flow control when the propagation delays are not large and the number of VCs is not so much.
Shohei KAMAMURA Hiroshi YAMAMOTO Kouichi GENDA Yuki KOIZUMI Shin'ichi ARAKAWA Masayuki MURATA
This paper proposes fast repairing methods that uses hierarchical software defined network controllers for recovering from massive failure in a large-scale IP over a wavelength-division multiplexing network. The network consists of multiple domains, and slave controllers are deployed in each domain. While each slave controller configures transport paths in its domain, the master controller manages end-to-end paths, which are established across multiple domains. For fast repair of intra-domain paths by the slave controllers, we define the optimization problem of path configuration order and propose a heuristic method, which minimizes the repair time to move from a disrupted state to a suboptimal state. For fast repair of end-to-end path through multiple domains, we also propose a network abstraction method, which efficiently manages the entire network. Evaluation results suggest that fast repair within a few minutes can be achieved by applying the proposed methods to the repairing scenario, where multiple links and nodes fail, in a 10,000-node network.
Suyong EUM Shin'ichi ARAKAWA Masayuki MURATA
Topological structure of peer-to-peer (P2P) networks affects their operating performance. Thus, various models have been proposed to construct an efficient topology for the P2P networks. However, due to the simultaneous failures of peers and other disastrous events, it is difficult to maintain the originally designed topological structure that provides the network with some performance benefits. For this reason, in this paper we propose a simple local rewiring method that changes the network topology to have small diameter as well as highly clustered structure. Moreover, the presented evaluation study shows how these topological properties are involved with the performance of P2P networks.
Masafumi HASHIMOTO Go HASEGAWA Masayuki MURATA
To raise the energy efficiency of wireless clients, it is important to sleep in idle periods. When multiple network applications are running concurrently on a single wireless client, packets of each application are sent and received independently, but multiplexed at MAC-level. This uncoordinated behavior makes it difficult to control of sleep timing. In addition, frequent state transitions between active and sleep modes consume non-negligible energy. In this paper, we propose a transport-layer approach that resolves this problem and so reduces energy consumed by multiple TCP flows on a wireless LAN (WLAN) client. The proposed method, called SCTP tunneling, has two key features: flow aggregation and burst transmission. It aggregates multiple TCP flows into a single SCTP association between a wireless client and an access point to control packet transmission and reception timing. Furthermore, to improve the sleep efficiency, SCTP tunneling reduces the number of state transitions by handling multiple packets in a bursty fashion. In this study, we construct a mathematical model of the energy consumed by SCTP tunneling to assess its energy efficiency. Through numerical examples, we show that the proposed method can reduce energy consumption by up to 69%.
Doo Seop EOM Masashi SUGANO Masayuki MURATA Hideo MIYAHARA
It is well-known that TCP often experiences severe performance degradation in mobile networks since packet losses not related to network congestion occur frequently due to host mobility. In this paper, we propose a new packet buffering method to address such a problem without the scalability problem in Mobile IP based networks. For this purpose, we first investigate the performance of TCP Tahoe without considering packet buffering through the simulation. Our simulation result shows that in most cases, the smooth handoff by the route optimization extension of Mobile IP standard cannot prevent the degradation of TCP performance due to handoffs, although it is designed to reduce the number of packets dropped during the handoff. It also shows that in utilizing the route optimization extension, the TCP performance sometimes becomes worse even than the case of the base Mobile IP unless its smooth handoff makes less than four packets be dropped during the handoff. Such results mean that at least for TCP, the smooth handoff is not useful unless the route optimization extension supports the buffering method, which makes handoffs be transparent to transport layer protocols by recovering the packets dropped during the handoff. We then investigate the effects of packet buffering on the performance of TCP. We modify the route optimization extension in order to support packet buffering at the base station, but it is a very minor change. Finally, we discuss some problems that should be addressed to recover the packets dropped during the handoff by the buffering method without giving a worse impact on the performance of TCP, and propose our solution to solve those problems.
Yuichi OHSITA Shingo ATA Masayuki MURATA
Distributed denial-of-service attacks on public servers have recently become more serious. More are SYN Flood attacks, since the malicious attackers can easily exploit the TCP specification to generate traffic making public servers unavailable. To assure that network services will not be interrupted, we need faster and more accurate defense mechanisms against malicious traffic, especially SYN Floods. One of the problems in detecting SYN Flood traffic is that server nodes or firewalls cannot distinguish the SYN packets of normal TCP connections from those of SYN Flood attack. Moreover, since the rate of normal network traffic may vary, we cannot use an explicit threshold of SYN arrival rates to detect SYN Flood traffic. In this paper we introduce a mechanism for detecting SYN Flood traffic more accurately by taking into consideration the time variation of arrival traffic. We first investigate the statistics of the arrival rates of both normal TCP SYN packets and SYN Flood attack packets. We then describe our new detection mechanism based on the statistics of SYN arrival rates. Our analytical results show that the arrival rate of normal TCP SYN packets can be modeled by a normal distribution and that our proposed mechanism can detect SYN Flood traffic quickly and accurately regardless of time variance of the traffic.