The search functionality is under construction.

Keyword Search Result

[Keyword] overlay network(48hit)

1-20hit(48hit)

  • Broadcast with Tree Selection from Multiple Spanning Trees on an Overlay Network Open Access

    Takeshi KANEKO  Kazuyuki SHUDO  

     
    PAPER-Network

      Pubricized:
    2022/08/16
      Vol:
    E106-B No:2
      Page(s):
    145-155

    On an overlay network where a number of nodes work autonomously in a decentralized way, the efficiency of broadcasts has a significant impact on the performance of distributed systems built on the network. While a broadcast method using a spanning tree produces a small number of messages, the routing path lengths are prone to be relatively large. Moreover, when multiple nodes can be source nodes, inefficient broadcasts often occur because the efficient tree topology differs for each node. To address this problem, we propose a novel protocol in which a source node selects an efficient tree from multiple spanning trees when broadcasting. Our method shortens routing paths while maintaining a small number of messages. We examined path lengths and the number of messages for broadcasts on various topologies. As a result, especially for a random graph, our proposed method shortened path lengths by approximately 28% compared with a method using a spanning tree, with almost the same number of messages.

  • Experiment of Integrated Technologies in Robotics, Network, and Computing for Smart Agriculture Open Access

    Ryota ISHIBASHI  Takuma TSUBAKI  Shingo OKADA  Hiroshi YAMAMOTO  Takeshi KUWAHARA  Kenichi KAWAMURA  Keisuke WAKAO  Takatsune MORIYAMA  Ricardo OSPINA  Hiroshi OKAMOTO  Noboru NOGUCHI  

     
    INVITED PAPER

      Pubricized:
    2021/11/05
      Vol:
    E105-B No:4
      Page(s):
    364-378

    To sustain and expand the agricultural economy even as its workforce shrinks, the efficiency of farm operations must be improved. One key to efficiency improvement is completely unmanned driving of farm machines, which requires stable monitoring and control of machines from remote sites, a safety system to ensure safe autonomous driving even without manual operations, and precise positioning in not only small farm fields but also wider areas. As possible solutions for those issues, we have developed technologies of wireless network quality prediction, an end-to-end overlay network, machine vision for safety and positioning, network cooperated vehicle control and autonomous tractor control and conducted experiments in actual field environments. Experimental results show that: 1) remote monitoring and control can be seamlessly continued even when connection between the tractor and the remote site needs to be switched across different wireless networks during autonomous driving; 2) the safety of the autonomous driving can automatically be ensured by detecting both the existence of people in front of the unmanned tractor and disturbance of network quality affecting remote monitoring operation; and 3) the unmanned tractor can continue precise autonomous driving even when precise positioning by satellite systems cannot be performed.

  • An Efficient Routing Method for Range Queries in Skip Graph

    Ryohei BANNO  Kazuyuki SHUDO  

     
    PAPER

      Pubricized:
    2019/12/09
      Vol:
    E103-D No:3
      Page(s):
    516-525

    Skip Graph is a promising distributed data structure for large scale systems and known for its capability of range queries. Although several methods of routing range queries in Skip Graph have been proposed, they have inefficiencies such as a long path length or a large number of messages. In this paper, we propose a novel routing method for range queries named Split-Forward Broadcasting (SFB). SFB introduces a divide-and-conquer approach, enabling nodes to make full use of their routing tables to forward a range query. It brings about a shorter average path length than existing methods, as well as a smaller number of messages by avoiding duplicate transmission. We clarify the characteristics and effectiveness of SFB through both analytical and experimental comparisons. The results show that SFB can reduce the average path length roughly 30% or more compared with a state-of-the-art method.

  • On the Design and Implementation of IP-over-P2P Overlay Virtual Private Networks Open Access

    Kensworth SUBRATIE  Saumitra ADITYA  Vahid DANESHMAND  Kohei ICHIKAWA  Renato FIGUEIREDO  

     
    INVITED PAPER-Network

      Pubricized:
    2019/08/05
      Vol:
    E103-B No:1
      Page(s):
    2-10

    The success and scale of the Internet and its protocol IP has spurred emergent distributed technologies such as fog/edge computing and new application models based on distributed containerized microservices. The Internet of Things and Connected Communities are poised to build on these technologies and models and to benefit from the ability to communicate in a peer-to-peer (P2P) fashion. Ubiquitous sensing, actuating and computing implies a scale that breaks the centralized cloud computing model. Challenges stemming from limited IPv4 public addresses, the need for transport layer authentication, confidentiality and integrity become a burden on developing new middleware and applications designed for the network's edge. One approach - not reliant on the slow adoption of IPv6 - is the use of virtualized overlay networks, which abstract the complexities of the underlying heterogeneous networks that span the components of distributed fog applications and middleware. This paper describes the evolution of the design and implementation of IP-over-P2P (IPOP) - from its purist P2P inception, to a pragmatic hybrid model which is influenced by and incorporates standards. The hybrid client-server/P2P approach allows IPOP to leverage existing robust and mature cloud infrastructure, while still providing the characteristics needed at the edge. IPOP is networking cyber infrastructure that presents an overlay virtual private network which self-organizes with dynamic membership of peer nodes into a scalable structure. IPOP is resilient to partitioning, supports redundant paths within its fabric, and provides software defined programming of switching rules to utilize these properties of its topology.

  • Suzaku: A Churn Resilient and Lookup-Efficient Key-Order Preserving Structured Overlay Network

    Kota ABE  Yuuichi TERANISHI  

     
    PAPER-Network

      Pubricized:
    2019/03/05
      Vol:
    E102-B No:9
      Page(s):
    1885-1894

    A key-order preserving structured overlay network is a class of structured overlay network that preserves, in its structure, the order of keys to support efficient range queries. This paper presents a novel key-order preserving structured overlay network “Suzaku”. Similar to the conventional Chord#, Suzaku uses a periodically updated finger table as a routing table, but extends its uni-directional finger table to bi-directional, which achieves ⌈log2 n⌉-1 maximum lookup hops in the converged state. Suzaku introduces active and passive bi-directional finger table update algorithms for node insertion and deletion. This method maintains good lookup performance (lookup hops increase nearly logarithmically against n) even in churn situations. As well as its good performance, the algorithms of Suzaku are simple and easy to implement. This paper describes the principles of Suzaku, followed by simulation evaluations, in which it showed better performance than the conventional networks, Chord# and Skip Graph.

  • Trustworthy DDoS Defense: Design, Proof of Concept Implementation and Testing

    Mohamad Samir A. EID  Hitoshi AIDA  

     
    PAPER-Internet Security

      Pubricized:
    2017/05/18
      Vol:
    E100-D No:8
      Page(s):
    1738-1750

    Distributed Denial of Service (DDoS) attacks based on HTTP and HTTPS (i.e., HTTP(S)-DDoS) are increasingly popular among attackers. Overlay-based mitigation solutions attract small and medium-sized enterprises mainly for their low cost and high scalability. However, conventional overlay-based solutions assume content inspection to remotely mitigate HTTP(S)-DDoS attacks, prompting trust concerns. This paper reports on a new overlay-based method which practically adds a third level of client identification (to conventional per-IP and per-connection). This enhanced identification enables remote mitigation of more complex HTTP(S)-DDoS categories without content inspection. A novel behavior-based reputation and penalty system is designed, then a simplified proof of concept prototype is implemented and deployed on DeterLab. Among several conducted experiments, two are presented in this paper representing a single-vector and a multi-vector complex HTTP(S)-DDoS attack scenarios (utilizing LOIC, Slowloris, and a custom-built attack tool for HTTPS-DDoS). Results show nearly 99.2% reduction in attack traffic and 100% chance of legitimate service. Yet, attack reduction decreases, and cost in service time (of a specified file) rises, temporarily during an approximately 2 minutes mitigation time. Collateral damage to non-attacking clients sharing an attack IP is measured in terms of a temporary extra service time. Only the added identification level was utilized for mitigation, while future work includes incorporating all three levels to mitigate switching and multi-request per connection attack categories.

  • Living Will for Resilient Structured Overlay Networks

    Kimihiro MIZUTANI  Takeru INOUE  Toru MANO  Osamu AKASHI  Satoshi MATSUURA  Kazutoshi FUJIKAWA  

     
    PAPER

      Vol:
    E99-B No:4
      Page(s):
    830-840

    The routing efficiency of structured overlay networks depends on the consistency of pointers between nodes, where a pointer maps a node identifier to the corresponding address. This consistency can, however, break temporarily when some overlay nodes fail, since it takes time to repair the broken pointers in a distributed manner. Conventional solutions utilize “backpointers” to quickly discover any failure among the pointing nodes, which allow them to fix the pointers in a short time. Overlay nodes are, however, required to maintain backpointers for every pointing node, which incurs significant memory and consistency check overhead. This paper proposes a novel light-weight protocol; an overlay node gives a “living will” containing its acquaintances (backpointers) only to its successor, thus other nodes are freed from the need to maintain it. Our carefully-designed protocol guarantees that all acquaintances are registered via the living will, even in the presence of churn, and the successor notifies the acquaintances for the deceased. Even if the successor passes away and the living will is lost, the successor to the successor can identify the acquaintances with a high success ratio. Simulations show that our protocol greatly reduces memory overhead as well as the detection time for node failure with the cost being a slight increase in messaging load.

  • A Distributed Mechanism for Probing Overlay Path Bandwidth Using Local Information Exchange

    Tien Hoang DINH  Go HASEGAWA  Masayuki MURATA  

     
    PAPER-Network

      Vol:
    E97-B No:5
      Page(s):
    981-995

    Available bandwidth, along with latency and packet loss rate, is an essential metric for the efficient operation of overlay network applications. However, the measurement of available bandwidth creates a larger traffic overhead than other metrics. Measurement conflicts on route-overlapping paths can also seriously degrade measurement accuracy and cause a non-negligible increase in the network load. In this paper, we propose a distributed method for measuring the available bandwidth in overlay networks that can reduce measurement conflicts while maintaining high measurement accuracy at low cost. Our main idea is that neighboring overlay nodes exchange route information to detect overlapping paths and share the measurement results of overlapping paths to configure parameter settings for available bandwidth measurements. Our simulation results show that the relative errors in the measurement results of our method are approximately only 65% of those of the existing method. The measurement accuracy of our method remains better than that of the existing method when the total measurement traffic loads of both methods are equal.

  • MARIF: Multiple Queries Look-Up Architecture Using Range Information Feedback in a DHT Network

    Kimihiro MIZUTANI  Toru MANO  Osamu AKASHI  Kensuke FUKUDA  

     
    PAPER

      Vol:
    E96-B No:7
      Page(s):
    1680-1690

    In DHT network, a node can get/put a requested data by only log N look-up steps. However, conventional DHT network only supports single query look-up to search data. From the reason, each node in a DHT network must execute look-up process for each query even if a large number of put and get operations are executed. Therefore, this results in high network load in massive data management such as MapReduce, sensor network, and web information. To address the problem, we propose multiple queries look-up architecture using range information feedback (MARIF). MARIF extends the conventional KBR protocol to supports range information that is a scope of ID space a node keeps. When a source node receives range information from a destination node, the source node checks all queries in the range information and forwards queries matching the range information to the destination node directly. This effectively reduces the number of look-up queries and the network load for the IP network. In addition, MARIF can be implemented into conventional DHT networks and can easily be combined to effective DHT routing algorithms such as Chord, Kademlia, Pastry, and one-hop DHT. In evaluation, we implement MARIF into three DHT networks and compare its performance with that of conventional query bundling mechanisms based on the KBR protocol. The results show that MARIF reduces by up to 40% the total number of forwarding queries to put data compared with other mechanisms. In addition, MARIF saves the number of forwarding queries per look-up process by up to 85% compared to other mechanisms with low bundling overhead.

  • Programmable IP Service Gateway for Software-Defined Networking: Assisting Easy Composition of Service Overlays

    Jinyong JO  Soyeon LEE  JongWon KIM  

     
    PAPER-Internet

      Vol:
    E96-B No:7
      Page(s):
    1918-1929

    Overlay networking makes it easy for users add new network functionalities while keeping existing Internet connectivity intact. This paper introduces SCONE (Service-COmposable InterNEt) as a networking service to facilitate the management of service overlay networking. By looking into the structure of programmable overlay nodes, SCONE provides programmable IP service gateways (PSGs) that ensure high-speed per-flow packet processing for overlay networking. In order to meet the data-rate requirements of various host applications, each PSG is accelerated by hardware packet processing for its data plane. It also leverages the space-efficient pattern matching of entity cloning and provides localized (i.e., de-centralized) services to assist the scalable support for software-defined networking (SDN). An experiment result shows that the proposed PSGs can support high-fidelity overlay networking from both performance and scalability perspectives.

  • An Application-Level Routing Method with Transit Cost Reduction Based on a Distributed Heuristic Algorithm

    Kazuhito MATSUDA  Go HASEGAWA  Masayuki MURATA  

     
    PAPER-Network

      Vol:
    E96-B No:6
      Page(s):
    1481-1491

    Application-level routing that chooses an end-to-end traffic route that relays other end hosts can improve user-perceived performance metrics such as end-to-end latency and available bandwidth. However, selfish route selection performed by each end user can lead to a decrease in path performance due to overload by route overlaps, as well as an increase in the inter-ISP transit cost as a result of utilizing more transit links compared with native IP routing. In this paper, we first strictly define an optimization problem for selecting application-level traffic routes with the aim of maximizing end-to-end network performance under a transit cost constraint. We then propose an application-level traffic routing method based on distributed simulated annealing to obtain good solutions to the problem. We evaluate the performance of the proposed method by assuming that PlanetLab nodes utilize application-level traffic routing. We show that the proposed routing method can result in considerable improvement of network performance without increasing transit cost. In particular, when using end-to-end latency as a routing metric, the number of overloaded end-to-end paths can be reduced by about 65%, as compared with that when using non-coordinated methods. We also demonstrate that the proposed method can react to dynamic changes in traffic demand and select appropriate routes.

  • A Method to Reduce Inter-ISP Transit Cost Caused by Overlay Routing Based on End-to-End Network Measurement

    Kazuhito MATSUDA  Go HASEGAWA  Satoshi KAMEI  Masayuki MURATA  

     
    PAPER-Information Network

      Vol:
    E96-D No:2
      Page(s):
    289-302

    Overlay routing is an application-level routing mechanism on overlay networks. Previous researches have revealed that the overlay routing can improve user-perceived performance. However, it may also generate traffic unintended by ISPs, incurring additional monetary cost. In addition, since ISPs and end users have their own objectives respectively regarding traffic routing, overlay routing must be operated considering both standpoints. In the present paper, we propose a method to reduce inter-ISP transit costs caused by overlay routing from the both standpoints of ISPs and end users. To determine the relationships among ASes, which are required for ISP cost-aware routing, we construct a method to estimate a transit cost of overlay-routed paths from end-to-end network performance values. Utilizing the metric, we propose a novel method that controls overlay routing from the both standpoints of ISPs and end users. Through extensive evaluations using measurement results from the actual network environments, we confirm that the advantage of the proposed method whereby we can reduce the transit cost in the overlay routing and can control the overlay routing according to the objectives of both ISPs and end users.

  • A Low-Cost, Distributed and Conflict-Aware Measurement Method for Overlay Network Services Utilizing Local Information Exchange

    Tien Hoang DINH  Go HASEGAWA  Masayuki MURATA  

     
    PAPER

      Vol:
    E96-B No:2
      Page(s):
    459-469

    Measuring network resource information, including available bandwidth, propagation delay, and packet loss ratio, is an important task for efficient operation of overlay network services. Although measurement accuracy can be enhanced by frequent measurements, performing measurements with high frequency can cause measurement conflict problem that increases the network load and degrades measurement accuracy. In this paper, we propose a low-cost, distributed and conflict-aware measurement method that reduces measurement conflicts while maintaining high measurement accuracy. The main idea is that the overlay node exchanges the route information and the measurement results with its neighboring overlay nodes while decreasing the measurement frequency. This means our method trades the overhead of conducting measurements for the overhead of information exchange to enhance measurement accuracy. Simulation results show that the relative error in the measurement results of our method can be decreased by half compared with the existing method when the total measurement overheads of both methods are equal. We also confirm that exchanging measurement results contributes more to the enhancement of measurement accuracy than performing measurements.

  • A Design and Prototyping of In-Network Processing Platform to Enable Adaptive Network Services

    Masayoshi SHIMAMURA  Takeshi IKENAGA  Masato TSURU  

     
    PAPER

      Vol:
    E96-D No:2
      Page(s):
    238-248

    The explosive growth of the usage along with a greater diversification of communication technologies and applications imposes the Internet to manage further scalability and diversity, requiring more adaptive and flexible sharing schemes of network resources. Especially when a number of large-scale distributed applications concurrently share the resource, efficacy of comprehensive usage of network, computation, and storage resources is needed from the viewpoint of information processing performance. Therefore, a reconsideration of the coordination and partitioning of functions between networks (providers) and applications (users) has become a recent research topic. In this paper, we first address the need and discuss the feasibility of adaptive network services by introducing special processing nodes inside the network. Then, a design and an implementation of an advanced relay node platform are presented, by which we can easily prototype and test a variety of advanced in-network processing on Linux and off-the-shelf PCs. A key feature of the proposed platform is that integration between kernel and userland spaces enables to easily and quickly develop various advanced relay processing. Finally, on the top of the advanced relay node platform, we implement and test an adaptive packet compression scheme that we previously proposed. The experimental results show the feasibility of both the developed platform and the proposed adaptive packet compression.

  • A Geographic Location-Based Distributed Routing System

    Kumiko KOBAYASHI  I Gusti Bagus Baskara NUGRAHA  Hiroyoshi MORITA  

     
    PAPER-Network System

      Vol:
    E96-B No:1
      Page(s):
    88-98

    In this paper, we propose a geographic location-based distributed routing (GDR) system. The GDR system provides information lookup based on latitude and longitude coordinates. Each node of the GDR system utilizes the coordinates as an identifier (ID), and manages an overlay routing table. An ID is generated to reflect the geographical location without using Space Filling Curve (SFC). The ID is in cartesian format (x, y), which represents the longitude x and latitude y. In a system with N nodes, each node has a routing table of size log N and a search is possible in O(log N). We evaluate the routing performance of GDR and other systems based on Chord, Kademlia and CAN. We show that in both the ID is in cartesian format and the ID is generated by using SFC, GDR, Chord and Kademlia have the same mean and the same variance of the path length, while the mean and the variance of the relay length of GDR are smaller than those of Chord and Kademlia. Furthermore, while GDR and CAN have the same mean and the same variance of the relay length, the mean and the variance of the path length of GDR are smaller than those of CAN.

  • Randomized Search Strategy for Unstructured P2P Networks

    Wei-Mei CHEN  Kuang-Chu LIU  

     
    LETTER-Network

      Vol:
    E95-B No:1
      Page(s):
    289-292

    P2P (peer-to-peer) file sharing systems have been in operation for years. However, recent studies show that many peers in P2P networks are free-riders, who download files but are unwilling to share. This paper proposes a randomized search algorithm that considers the potential of a peer for information exchange and controlled query forwarding in the search process. Based on churn situations, the simulation results in this study demonstrate that the proposed algorithm can reduce network traffic and search latency while searching for files in the system.

  • Overview of Traceback Mechanisms and Their Applicability Open Access

    Heung-Youl YOUM  

     
    INVITED PAPER

      Vol:
    E94-D No:11
      Page(s):
    2077-2086

    As an increasing number of businesses and services depend on the Internet, protecting them against DDoS (Distributed Denial of Service) attacks becomes a critical issue. A traceback is used to discover technical information concerning the ingress points, paths, partial paths or sources of a packet or packets causing a problematic network event. The traceback mechanism is a useful tool to identify the attack source of the (DDoS) attack, which ultimately leads to preventing against the DDoS attack. There are numerous traceback mechanisms that have been proposed by many researchers. In this paper, we analyze the existing traceback mechanisms, describe the common security capabilities of traceback mechanisms, and evaluate them in terms of the various criteria. In addition, we identify typical application of traceback mechanisms.

  • Bootstrap Node-Centered Proximity Identifier Selection for Structured Overlays in Private Networks

    Masashi YOSHIDA  Koichi YAGISHITA  Yusuke DOHI  Kumiko KOBAYASHI  Yutaka SAKAI  Shigeyuki ASAMI  

     
    LETTER-Network

      Vol:
    E94-B No:3
      Page(s):
    813-817

    Distributed hash tables (DHTs) enable companies or campuses to use voice over IP (VoIP) systems in private networks at low cost. However, DHTs incur latency stretch caused by a topology mismatch between the application layer and the physical layer. Reducing this latency stretch is critical when implementing real-time applications that use DHTs, such as VoIP systems. This letter proposes a new method for reducing the latency stretch by creating node IDs, which form structured overlays that consider node proximity. Simulation results show that the proposed method is superior to Chord in terms of the distance between nodes, look-up path length, network burden, and look-up latency.

  • Integrating Overlay Protocols for Providing Autonomic Services in Mobile Ad-Hoc Networks

    Panagiotis GOUVAS  Anastasios ZAFEIROPOULOS  Athanassios LIAKOPOULOS  Gregoris MENTZAS  Nikolas MITROU  

     
    PAPER

      Vol:
    E93-B No:8
      Page(s):
    2022-2034

    Next generation network characteristics increase the complexity in the design and provision of advanced services, making inappropriate the selection of traditional approaches. Future networks are becoming larger in scale, more dynamic and more heterogeneous. In order to cope with these requirements, services are expected to adapt to environmental conditions and require minimum human intervention. In this paper a new model for providing autonomous and decentralized services is proposed, especially focusing on mobile ad hoc networks (MANETs). Using a newly proposed four-layered approach, service development may be realized independently from the underlying physical network. In a reference implementation, it is demonstrated that it is possible to set up an overlay network that hides any network changes from the service layer. Multiple mechanisms have been adapted in order to efficiently -- in terms of message exchanges and convergence time -- operate over an ad hoc environment. Finally, it is demonstrated that a specific service could operate over a dynamic network with multiple failures.

  • Cooperative Resource Pricing in Service Overlay Networks for Mobile Agents

    Tadashi NAKANO  Yutaka OKAIE  

     
    LETTER-Network

      Vol:
    E93-B No:7
      Page(s):
    1927-1930

    The success of peer-to-peer overlay networks depends on cooperation among participating peers. In this paper, we investigate the degree of cooperation among individual peers required to induce globally favorable properties in an overlay network. Specifically, we consider a resource pricing problem in a market-oriented overlay network where participating peers sell own resources (e.g., CPU cycles) to earn energy which represents some money or rewards in the network. In the resource pricing model presented in this paper, each peer sets the price for own resource based on the degree of cooperation; non-cooperative peers attempt to maximize their own energy gains, while cooperative peers maximize the sum of own and neighbors' energy gains. Simulation results are presented to demonstrate that the network topology is an important factor influencing the minimum degree of cooperation required to increase the network-wide global energy gain.

1-20hit(48hit)