The search functionality is under construction.

Keyword Search Result

[Keyword] Internet(292hit)

81-100hit(292hit)

  • A Survey of the Research on Future Internet and Network Architectures Open Access

    Toru HASEGAWA  

     
    INVITED SURVEY PAPER

      Vol:
    E96-B No:6
      Page(s):
    1385-1401

    The Internet was designed for academic use more than 40 years ago. After having been used commercially, many unpredictable requirements have emerged, including mobility, security and content distribution. In addition, the Internet has become so ossified that fulfilling new requirements is difficult. Instead of developing ad-hoc solutions, re-designing clean-slate Internet architectures has become a key research challenge in networking communities. This survey paper addresses key research issues and then introduces ongoing research projects from Japan, the United States and the European Union.

  • ZNP: A New Generation Network Layer Protocol Based on ID/Locator Split Considering Practical Operation

    Sho KANEMARU  Kazuma YONEMURA  Fumio TERAOKA  

     
    PAPER-Network

      Vol:
    E96-B No:3
      Page(s):
    764-777

    To support mobility, multihoming, routing scalability, and security, there are a lot of proposals based on ID/Locator split approach not only for the current Internet but also for the future Internet. However, none of them meet the requirements for practical operation such as (1) support heterogeneous network layer protocols, (2) scalability of ID/Locator mapping system, (3) independence of mapping information management, and (4) avoidance of locator leakage beyond the administrative boundary. This paper proposes a network layer protocol called Z Network Protocol (ZNP) for the future Internet based on the clean slate approach. ZNP supports heterogeneity of network layer protocols by “Internetworking with a Common ID Space”. Its mapping systems meet the requirements (1)–(4) described above. For manipulating the mapping systems, Z Control Message Protocol (ZCMP) is designed. For resolving the link layer (L2) address from the ZNP Locator, Z Neighbor Discovery Protocol (ZNDP) is designed. We implement ZNP and ZNDP in the Linux kernel, ZCMP in the user space and measure the times needed for transmission, reception, forwarding, and locator conversion. The results show the practicability of ZNP as a network layer protocol for the future Internet.

  • Survey on Data Center Networking Technologies Open Access

    Yoshiaki KIRIHA  Motoo NISHIHARA  

     
    INVITED SURVEY PAPER

      Vol:
    E96-B No:3
      Page(s):
    713-721

    In recent years, technologies and markets related to data centers have been rapidly changing and growing. Data centers are playing an important role in ICT infrastructure deployment and promise to become common platforms for almost all social infrastructures. Even though research has focused on networking technologies, various technologies are needed to develop high-performance, cost-efficient, and flexible large-scale data centers. To understand those technologies better, this paper surveys recent research and development efforts and results in accordance with a data center network taxonomy that the authors defined.

  • Global Asymptotic Stability of FAST TCP in the Presence of Time-Varying Network Delay and Cross Traffic

    Joon-Young CHOI  Hongju KIM  Soonman KWON  

     
    PAPER-Internet

      Vol:
    E96-B No:3
      Page(s):
    802-810

    We address the global asymptotic stability of FAST TCP, especially considering cross traffics, time-varying network feedback delay, and queuing delay dynamics at link. Exploiting the inherent dynamic property of FAST TCP, we construct two sequences that represent the lower and upper bound variations of the congestion window in time. By showing that the sequences converge to the equilibrium point of the congestion window, we establish that FAST TCP in itself is globally asymptotically stable without any specific conditions on the tuning parameter α or the update gain γ.

  • Revisiting the Rich Club of the Internet AS-Level Topology

    Yangyang WANG  Jun BI  Jianping WU  

     
    LETTER-Network

      Vol:
    E96-B No:3
      Page(s):
    900-904

    We evaluate the rich-club property of the Internet topology at the autonomous system (AS) level by comparing the Internet AS graphs of traceroute and BGP, and the synthetic graphs of PFP model. The results indicate that, for rich-club coefficient, PFP model can exactly match traceroute AS graphs in the early years around 2002, but it has significantly deviated from the grown AS graphs since about 2010.

  • A Long Range Dependent Internet Traffic Model Using Unbounded Johnson Distribution

    Sunggon KIM  Seung Yeob NAM  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E96-B No:1
      Page(s):
    301-304

    It is important to characterize the distributional property and the long-range dependency of traffic arrival processes in modeling Internet traffic. To address this problem, we propose a long-range dependent traffic model using the unbounded Johnson distribution. Using the proposed model, a sequence of traffic rates with the desired four quantiles and Hurst parameter can be generated. Numerical studies show how well the sequence of traffic rates generated by the proposed model mimics that of the real traffic rates using a publicly available Internet traffic trace.

  • How to Make Content Centric Network (CCN) More Robust against DoS/DDoS Attack

    DaeYoub KIM  Jihoon LEE  

     
    LETTER-Network

      Vol:
    E96-B No:1
      Page(s):
    313-316

    Content-centric networking (CCN) is one of candidates being spotlighted as the technologies of the future Internet to solve the problems of the current Internet. Since DoS/DDoS attack is the most serious threat to the current Internet, this letter introduces the possibility of DoS/DDoS attack on CCN for the first time. And we introduce an attack method using fake-request packets and propose countermeasures in order to detect and/or react to CCN DoS/DDoS attack, and then analyze the result of our proposal.

  • Design and Deployment of Post-Disaster Recovery Internet in 2011 Tohoku Earthquake

    Kotaro KATAOKA  Keisuke UEHARA  Masafumi OE  Jun MURAI  

     
    PAPER

      Vol:
    E95-B No:7
      Page(s):
    2200-2209

    In disaster sites of 2011 Tohoku Earthquake, digital communication was virtually unavailable due to the serious damage to the existing Internet and ICT resources. Thus there were urgent demands for recovering the Internet connectivity and first aid communication tools. This paper describes the design and deployment of networking systems that provide Internet connectivity using 3G mobile links or VSAT satellite links. In this paper we examine two approaches for post-disaster networking: quickly deployable package and on-demand networking. Based on a comparison of their characteristics and deployment experiences, this paper tries to extract lessons that contribute to improving the preparedness to another disaster. This paper also shares our significant operational experience acquired through supporting a maximum of 54 sites in Tohoku area including evacuation shelters, temporary hospitals and local government offices.

  • Scalable Virtual Network Mapping Algorithm for Internet-Scale Networks

    Qiang YANG  Chunming WU  Min ZHANG  

     
    PAPER

      Vol:
    E95-B No:7
      Page(s):
    2222-2231

    The proper allocation of network resources from a common physical substrate to a set of virtual networks (VNs) is one of the key technical challenges of network virtualization. While a variety of state-of-the-art algorithms have been proposed in an attempt to address this issue from different facets, the challenge still remains in the context of large-scale networks as the existing solutions mainly perform in a centralized manner which requires maintaining the overall and up-to-date information of the underlying substrate network. This implies the restricted scalability and computational efficiency when the network scale becomes large. This paper tackles the virtual network mapping problem and proposes a novel hierarchical algorithm in conjunction with a substrate network decomposition approach. By appropriately transforming the underlying substrate network into a collection of sub-networks, the hierarchical virtual network mapping algorithm can be carried out through a global virtual network mapping algorithm (GVNMA) and a local virtual network mapping algorithm (LVNMA) operated in the network central server and within individual sub-networks respectively with their cooperation and coordination as necessary. The proposed algorithm is assessed against the centralized approaches through a set of numerical simulation experiments for a range of network scenarios. The results show that the proposed hierarchical approach can be about 5-20 times faster for VN mapping tasks than conventional centralized approaches with acceptable communication overhead between GVNCA and LVNCA for all examined networks, whilst performs almost as well as the centralized solutions.

  • Extended Darknet: Multi-Dimensional Internet Threat Monitoring System

    Akihiro SHIMODA  Tatsuya MORI  Shigeki GOTO  

     
    PAPER

      Vol:
    E95-B No:6
      Page(s):
    1915-1923

    Internet threats caused by botnets/worms are one of the most important security issues to be addressed. Darknet, also called a dark IP address space, is one of the best solutions for monitoring anomalous packets sent by malicious software. However, since darknet is deployed only on an inactive IP address space, it is an inefficient way for monitoring a working network that has a considerable number of active IP addresses. The present paper addresses this problem. We propose a scalable, light-weight malicious packet monitoring system based on a multi-dimensional IP/port analysis. Our system significantly extends the monitoring scope of darknet. In order to extend the capacity of darknet, our approach leverages the active IP address space without affecting legitimate traffic. Multi-dimensional monitoring enables the monitoring of TCP ports with firewalls enabled on each of the IP addresses. We focus on delays of TCP syn/ack responses in the traffic. We locate syn/ack delayed packets and forward them to sensors or honeypots for further analysis. We also propose a policy-based flow classification and forwarding mechanism and develop a prototype of a monitoring system that implements our proposed architecture. We deploy our system on a campus network and perform several experiments for the evaluation of our system. We verify that our system can cover 89% of the IP addresses while darknet-based monitoring only covers 46%. On our campus network, our system monitors twice as many IP addresses as darknet.

  • On Demand Content Anycasting to Enhance Content Server Using P2P Network

    Othman M. M. OTHMAN  Koji OKAMURA  

     
    PAPER

      Vol:
    E95-D No:2
      Page(s):
    514-522

    In this paper, we suggest a new technology called Content Anycasting, and we show our design and evaluation of it. Content Anycasting shows how to utilize the capabilities of one of the candidate future Internet technologies that is the Flow-based network as in OpenFlow to giving new opportunities to the future internet that are currently not available. Content Anycasting aims to provide more flexible and dynamic redirection of contents. This would be very useful in extending the content server's capacity by enabling it to serve more clients, and in improving the response of the P2P networks by reducing the time of joining P2P networks. This method relies on three important ideas which are; the content based networking, decision making by the network in a similar manner to anycast, and the participation of user clients in providing the service. This is done through the use of the flow-based actions in flow-based network and having some modifications to the content server and client.

  • QoS NSIS Signaling Layer Protocol for Mobility Support with a Cross-Layer Approach

    Sooyong LEE  Myungchul KIM  Sungwon KANG  Ben LEE  Kyunghee LEE  Soonuk SEOL  

     
    PAPER-Network

      Vol:
    E94-B No:10
      Page(s):
    2796-2804

    Providing seamless QoS guarantees for multimedia services is one of the most critical requirements in the mobile Internet. However, the effects of host mobility make it difficult to provide such services. The next steps in signaling (NSIS) was proposed by the IETF as a new signaling protocol, but it fails to address some mobility issues. This paper proposes a new QoS NSIS signaling layer protocol (QoS NSLP) using a cross-layer design that supports mobility. Our approach is based on the advance discovery of a crossover node (CRN) located at the crossing point between a current and a new signaling path. The CRN then proactively reserves network resources along the new path that will be used after handoff. This proactive reservation significantly reduces the session reestablishment delay and resolves the related mobility issues in NSIS. Only a few amendments to the current NSIS protocol are needed to realize our approach. The experimental results and simulation study demonstrate that our approach considerably enhances the current NSIS in terms of QoS performance factors and network resource usage.

  • Contact Conditions in Connectors that Cause Common Mode Radiation

    Yu-ichi HAYASHI  Yoshiki KAYANO  Takaaki MIZUKI  Hideaki SONE  Hiroshi INOUE  

     
    PAPER

      Vol:
    E94-C No:9
      Page(s):
    1369-1374

    When contact failure occurs in a connector in a coaxial high-frequency (HF) signal transmission line, it is well known that common-mode (CM) radiation occurs on the line. We focus on contact conditions in a connector causing such CM radiation. Experiments and simulations verify that CM radiation increases as the contact resistance increases. While the CM current strongly depends on the distribution pattern of contact resistances at a low resistance, the CM current does not depend on these pattern at a high resistance. Our results indicate that it is important to maintain a symmetrical distribution of contact spots whenever the number of such spots is four or more.

  • Resource Allocation Based on TCP Performance in Base Station Diversity Systems

    Katsuhiro NAITO  Kazuo MORI  Hideo KOBAYASHI  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E94-B No:8
      Page(s):
    2357-2365

    This paper proposes a resource allocation method based on TCP (Transmission Control Protocol) throughput for base station diversity systems. A goal of this study is to achieve high throughput wireless Internet access by utilizing multiple wireless links effectively. The conventional work showed that base station diversity techniques can improve TCP performance. However, the improvement depends on the wireless environment of the wireless terminal. The proposed resource allocation method allocates wireless links to a wireless terminal based on its estimated TCP throughput and current traffic of each base station. Our method can take account of some network protocols such as TCP and UDP (User Datagram Protocol) by measuring the current traffic of each base station. In addition, wireless links are preferentially assigned to the wireless terminal that has the largest performance improvement per wireless link. Therefore, the proposal provides better overall system performance than the previous technique.

  • Distributed Mobility Control in Proxy Mobile IPv6 Networks

    Heeyoung JUNG  Moneeb GOHAR  Ji-In KIM  Seok-Joo KOH  

     
    PAPER

      Vol:
    E94-B No:8
      Page(s):
    2216-2224

    In future mobile networks, the ever-increasing loads imposed by mobile Internet traffic will force the network architecture to be changed from hierarchical to flat structure. Most of the existing mobility protocols are based on a centralized mobility anchor, which will process all control and data traffic. In the flat network architecture, however, the centralized mobility scheme has some limitations, such as unwanted traffic flowing into the core network, service degradation by a single point of failure, and increased operational costs, etc. This paper proposes mobility schemes for distributed mobility control in the flat network architecture. Based on the Proxy Mobile IPv6 (PMIP), which is a well-known mobility protocol, we propose the three mobility schemes: Signal-driven PMIP (S-PMIP), Data-driven Distributed PMIP (DD-PMIP), and Signal-driven Distributed PMIP (SD-PMIP). By numerical analysis, we show that the proposed distributed mobility schemes can give better performance than the existing centralized scheme in terms of the binding update and packet delivery costs, and that SD-PMIP provides the best performance among the proposed distributed schemes.

  • Optimal Selection Criterion of the Modulation and Coding Scheme in Consideration of the Signaling Overhead of Mobile WiMAX Systems

    Jaewoo SO  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E94-B No:7
      Page(s):
    2153-2157

    An optimal selection criterion of the modulation and coding scheme (MCS) for maximizing spectral efficiency is proposed in consideration of the signaling overhead of mobile WiMAX systems with a hybrid automatic repeat request mechanism. A base station informs users about the resource assignments in each frame, and the allocation process generates a substantial signaling overhead, which influences the system throughput. However, the signaling overhead was ignored in previous MCS selection criteria. In this letter, the spectral efficiency is estimated on the basis of the signaling overhead and the number of transmissions. The performance of the proposed MCS selection criterion is evaluated in terms of the spectral efficiency in the mobile WiMAX system, with and without persistent allocation.

  • Global Exponential Stability of FAST TCP with Heterogeneous Time-Varying Delays

    Joon-Young CHOI  Kyungmo KOO  Jin Soo LEE  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E94-B No:7
      Page(s):
    1868-1874

    We address the stability property of the FAST TCP congestion control algorithm. Based on a continuous-time dynamic model of the FAST TCP network, we establish that FAST TCP in itself is globally exponentially stable without any specific conditions on the congestion control parameter or the update gain. Simulation results demonstrate the validity of the global exponential stability of FAST TCP.

  • Proposal and Evaluation of a Function-Distributed Mobility Architecture for the Future Internet

    Gen MOTOYOSHI  Kenji LEIBNITZ  Masayuki MURATA  

     
    PAPER-Network

      Vol:
    E94-B No:7
      Page(s):
    1952-1963

    Several task forces have been working on how to design the future Internet in a clean slate manner and mobility management is one of the key issues to be considered. However, mobility management in the future Internet is still being designed in an “all-in-one” way where all management functions are tightly kept at a single location and this results in cost inefficiency that can be an obstruction to constructing flexible systems. In this paper, we propose a new function-distributed mobility management architecture that can enable more flexible future Internet construction. Furthermore, we show the effectiveness of our proposed system via a cost analysis and computer simulation with a random walk mobility model.

  • A Network-Based Localized Mobility Approach for Locator/ID Separation Protocol

    Ping DONG  Jia CHEN  Hongke ZHANG  

     
    PAPER

      Vol:
    E94-B No:6
      Page(s):
    1536-1545

    Locator/ID Separation Protocol (LISP) is an efficient proposal for solving the severe routing scalability problems existing in the current IPv4-based Internet and the future IPv6-based Internet. However, the basic LISP architecture does not specify how to support mobility in detail. As mobility is a fundamental issue faced by the future Internet, LISP mobility architecture (LISP-MN) was proposed recently to extend LISP to support mobility. Nevertheless, LISP-MN is a host-based mobility approach which requires software changes in end systems. To some extent, such a design breaks the primary design principles of LISP, which is a network-based protocol and requires no modification to the hosts. In addition, LISP-MN faces the same inherent problems as other host-based approaches (e.g., MIPv4, MIPv6), such as handover latency, packet loss, and signalling overhead. To solve the above problems, this paper proposes MobileID, which is a network-based localized mobility approach for LISP. In our design, a mobile node is not aware of its mobility and does not participate in handover signalling. Instead, the network takes the responsibility for managing mobility on behalf of the mobile node. We present a general overview of MobileID architecture, and introduce the detailed protocol operations in terms of the basic MobileID handover process and the route optimization procedures. Furthermore, we describe a MobileID analytic model, and compare MobileID handover performance with three representative mobility solutions, i.e., LISP-MN, MIPv6 and PMIPv6. Numerical results show the superior performance of MobileID. The handover latency of MobileID is much lower than those of LISP-MN and MIPv6, and it becomes lower than that of PMIPv6 in case of a long wireless link delay.

  • Fast Traffic Classification Using Joint Distribution of Packet Size and Estimated Protocol Processing Time

    Rentao GU  Hongxiang WANG  Yongmei SUN  Yuefeng JI  

     
    PAPER

      Vol:
    E93-D No:11
      Page(s):
    2944-2952

    A novel approach for fast traffic classification for the high speed networks is proposed, which bases on the protocol behavior statistical features. The packet size and a new parameter named "Estimated Protocol Processing Time" are collected from the real data flows. Then a set of joint probability distributions is obtained to describe the protocol behaviors and classify the traffic. Comparing the parameters of an unknown flow with the pre-obtained joint distributions, we can judge which application protocol the unknown flow belongs to. Distinct from other methods based on traditional inter-arrival time, we use the "Estimated Protocol Processing Time" to reduce the location dependence and time dependence and obtain better results than traditional traffic classification method. Since there is no need for character string searching and parallel feature for hardware implementation with pipeline-mode data processing, the proposed approach can be easily deployed in the hardware for real-time classification in the high speed networks.

81-100hit(292hit)