The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] private network(17hit)

1-17hit
  • NAPT-Based Mobility Service for Software Defined Networks Open Access

    Shimin SUN  Li HAN  Xianshu JIN  Sunyoung HAN  

     
    INVITED PAPER

      Pubricized:
    2017/02/13
      Vol:
    E100-D No:5
      Page(s):
    932-938

    For IP-based mobile networks, efficient mobility management is vital to provision seamless online service. IP address starvation and scalability issue constrain the wide deployment of existing mobility schemes, such as Mobile IP, Proxy Mobile IP, and their derivations. Most of the studies focus on the scenario of mobility among public networks. However, most of current networks, such as home networks, sensor networks, and enterprise networks, are deployed with private networks hard to apply mobility solutions. With the rapid development, Software Defined Networking (SDN) offers the opportunity of innovation to support mobility in private network schemes. In this paper, a novel mobility management scheme is presented to support mobile node moving from public network to private network in a seamless handover procedure. The centralized control manner and flexible flow management in SDN are utilized to provide network-based mobility support with better QoS guarantee. Benefiting from SDN/OpenFlow technology, complex handover process is simplified with fewer message exchanges. Furthermore, handover efficiency can be improved in terms of delay and overhead reduction, scalability, and security. Analytical analysis and implementation results showed a better performance than mobile IP in terms of latency and throughput variation.

  • Virtual Fiber Networking and Impact of Optical Path Grooming on Creating Efficient Layer One Services

    Fumisato NARUSE  Yoshiyuki YAMADA  Hiroshi HASEGAWA  Ken-ichi SATO  

     
    PAPER

      Vol:
    E95-B No:3
      Page(s):
    723-729

    This paper presents a novel “virtual fiber” network service that exploits wavebands. This service provides virtual direct tunnels that directly convey wavelength paths to connect customer facilities. To improve the resource utilization efficiency of the service, a network design algorithm is developed that can allow intermediate path grooming at limited nodes and can determine the best node location. Numerical experiments demonstrate the effectiveness of the proposed service architecture.

  • Dynamic Online Bandwidth Adjustment Scheme Based on Kalai-Smorodinsky Bargaining Solution

    Sungwook KIM  

     
    LETTER-Network Management/Operation

      Vol:
    E93-B No:7
      Page(s):
    1935-1938

    Virtual Private Network (VPN) is a cost effective method to provide integrated multimedia services. Usually heterogeneous multimedia data can be categorized into different types according to the required Quality of Service (QoS). Therefore, VPN should support the prioritization among different services. In order to support multiple types of services with different QoS requirements, efficient bandwidth management algorithms are important issues. In this paper, I employ the Kalai-Smorodinsky Bargaining Solution (KSBS) for the development of an adaptive bandwidth adjustment algorithm. In addition, to effectively manage the bandwidth in VPNs, the proposed control paradigm is realized in a dynamic online approach, which is practical for real network operations. The simulations show that the proposed scheme can significantly improve the system performances.

  • Name-Based Address Mapping for Virtual Private Networks

    Peter SURANYI  Yasushi SHINJO  Kazuhiko KATO  

     
    PAPER-Internet

      Vol:
    E92-B No:1
      Page(s):
    200-208

    IPv4 private addresses are commonly used in local area networks (LANs). With the increasing popularity of virtual private networks (VPNs), it has become common that a user connects to multiple LANs at the same time. However, private address ranges for LANs frequently overlap. In such cases, existing systems do not allow the user to access the resources on all LANs at the same time. In this paper, we propose name-based address mapping for VPNs, a novel method that allows connecting to hosts through multiple VPNs at the same time, even when the address ranges of the VPNs overlap. In name-based address mapping, rather than using the IP addresses used on the LANs (the real addresses), we assign a unique virtual address to each remote host based on its domain name. The local host uses the virtual addresses to communicate with remote hosts. We have implemented name-based address mapping for layer 3 OpenVPN connections on Linux and measured its performance. The communication overhead of our system is less than 1.5% for throughput and less than 0.2 ms for each name resolution.

  • Network Design Scheme for Virtual Private Network Services

    Tomonori TAKEDA  Ryuichi MATSUZAKI  Ichiro INOUE  Shigeo URUSHIDANI  

     
    PAPER-Network

      Vol:
    E89-B No:11
      Page(s):
    3046-3054

    This paper proposes a network design scheme for Virtual Private Network (VPN) services. Traditionally, network design to compute required amount of resource is based on static point-to-point resource demand. This scheme is effective for traditional private line services. However, since VPN services allow multi-site connectivity for customers, it may not be appropriate to design a network based on static point-to-point resource demand. In particular, this scheme is not effective when the traffic pattern changes over time. Therefore, network design for VPN services introduces a new challenge in order to comply with traffic flexibility. There are conventional studies tackling this issue. In those studies, by defining a resource demand model considering flexibility, and designing the network based on this model, amount of resource required can be computed. However, there are some deficiencies in those studies. This paper proposes a new network design scheme, consisting of two components. The first one is a new resource demand model, created by extending conventional resource demand models, that can specify resource demand more precisely. The second one is a new network design algorithm for this resource demand model. Simulations are conducted to evaluate the performance of the proposed network design scheme, and the results show significant performance improvement against conventional schemes. In addition, deployment considerations of the proposed scheme are analyzed.

  • Traffic Engineering for Provisioning Restorable Hose-Model VPNs

    Yu-Liang LIU  Yeali Sunny SUN  Meng Chang CHEN  

     
    PAPER

      Vol:
    E89-B No:9
      Page(s):
    2394-2403

    Virtual Private Networks (VPNs) are overlay networks established on top of a public network backbone with the goal of providing a service comparable to Private Networks (PNs). The recently proposed VPN hose-model provides customers with flexible and convenient ways to specify their bandwidth requirements. To meet the specified bandwidth requirements, the Network Service Provider (NSP) must reserve sufficient bandwidth on the data transmission paths between each pair of endpoints in a VPN. In addition, the reliability of a VPN depends on the reliability of the data transmission paths. Italiano et al. proposed an algorithm that finds a set of backup paths for a given VPN (VPN tree) under the single-link failure model [1]. When a link failure is detected on a VPN tree, a backup path corresponding to the failed link can be activated to restore the disconnected VPN tree into a new one, thereby ensuring the reliability of the VPN. However, Italiano's algorithm cannot guarantee that the specified bandwidth requirement of the given VPN under the single-link failure model will be met. To address this issue, we propose a new backup path set selection algorithm called BANGUAD in this paper. In addition, the problem of establishing multiple bandwidth-guaranteed hose-model VPNs under the single-link failure model has not been investigated previously. However in this problem, bandwidth-sharing algorithms have the potential to improve the performance of a provisioning algorithm significantly. Therefore, we also propose a bandwidth sharing algorithm and three provisioning algorithms for establishing multiple bandwidth-guaranteed hose-model VPNs under the single-link failure model. Simulations that compare the performance of the proposed algorithms are reported.

  • Improving Ethernet Reliability and Stability Using Global Open Ethernet Technology

    Masaki UMAYABASHI  Youichi HIDAKA  Nobuyuki ENOMOTO  Daisaku OGASAHARA  Kazuo TAKAGI  Atsushi IWATA  Akira ARUTAKI  

     
    PAPER

      Vol:
    E89-B No:3
      Page(s):
    675-682

    In this paper, authors present new schemes of our proposed Global Open Ethernet (GOE) technology from a viewpoint of improving reliability in metro-area Ethernet environment and show the numerical evidence on their performance results. Although several standardized or vendor proprietary technologies are proposed to improve Ethernet reliability, they still have reliability problems in terms of long failure recovery time (due to forwarding database (FDB) flush and recovery from a root bridge failure on spanning tree protocol), broadcast storm, and packet loss in network reconfiguration. To solve these problems, we introduce three schemes, a Per Destination - Multiple Rapid Spanning Tree Protocol (PD-MRSTP), a GOE Virtual Switch Redundancy Protocol (GVSRP), and an In-Service Reconfiguration (ISR) schemes. PD-MRSTP scheme reduces the failure recovery time by eliminating the need to flush the FDB and to recover from root bridge failures. GVSRP scheme ensures the reliability of connections between a GOE domain and a legacy Ethernet domain. Combined with PD-MRSTP, GVSRP prevents broadcast storm problems due to loops in the inter-domain area. ISR scheme enables in-service bridge replacement and upgrade without packet loss. Evaluating our prototype system, we obtained the following remarkable performance results. The GOE network using PD-MRSTP scheme delivered a fast failure recovery performance (4 ms) independent of the number of MAC address entries, whereas the legacy Ethernet network took 522 ms when a bridge had 6000 MAC address entries. Since we found that the failure recovery time increased in proportion to the number of MAC address entries, the one in large carrier network having one million of MAC address entries would take several tens of seconds. Thus using PD-MRSTP can reduce failure recovery time one ten-thousandth comparing with that of legacy Ethernet. In addition, evaluation of the ISR scheme demonstrated that a network can be upgraded with zero packet loss. Therefore, a GOE-based VPN is a promising alternative to other Ethernet VPNs for its reliability and stability.

  • Resource Management in Layer 1 Virtual Private Networks

    Tomonori TAKEDA  Takumi OHBA  Ichiro INOUE  Shigeo URUSHIDANI  

     
    PAPER-Network

      Vol:
    E88-B No:8
      Page(s):
    3343-3352

    This paper proposes resource management in Layer 1 Virtual Private Networks (VPNs). We have been proposing Layer 1 VPNs that provide layer 1 services to multiple customers over the single optical network with per VPN control and management capabilities. We have proposed two resource management models for Layer 1 VPNs, which constitute different class of services. One is the shared model, where resources are shared among VPNs. The other is the dedicated model, where resources are explicitly pre-assigned to each VPN. In this paper, after introducing an overview of Layer 1 VPNs, we evaluate several path computation algorithms for these two models focusing on the multi layer network scenario. In the shared model, there are several existing studies for non-VPN cases, but considerations for VPN cases are not investigated. This paper evaluates algorithms originally proposed for non-VPN cases for use in VPN cases. Simulation results show that the path computation algorithm that works as saving layer 1 resources achieves better resource sharing effect. In the dedicated model, the problem is identical to non-VPN cases. There is one conventional algorithm, but amount of available resources is not well considered. We propose a novel path computation algorithm. Simulation results show effectiveness of our proposed algorithm against the conventional algorithm. Furthermore, resource usage efficiency of two resource management models is compared. We analyze and propose applicability of resource management models.

  • Dynamic Capacity Resizing for Fair Bandwidth Sharing in Virtual Private Networks

    Seung Hyong RHEE  Takis KONSTANTOPOULOS  

     
    PAPER-Network

      Vol:
    E86-B No:5
      Page(s):
    1625-1631

    A virtual private network (VPN) service is likely to be used by customers as a replacement for networks constructed using private lines, and thus its functionality should include the performance guarantee provided to those customers. To provide guaranteed services, the network provider allocates appropriate capacities to multiple virtual backbone networks such that the underlying network can be shared among them. As VPN users are demanding reliable and dynamic allocation of capacities, recently the capacity resizing approach has been considered as a cost efficient way of providing virtual network services. We propose a new scheme for dynamic allocation of virtual link capacities. The allocated capacities are adjusted dynamically according to the users' requests such that their capacities are increased in a fair manner and the total reservation does not overwhelm the underlying network. Depending on the network's status and allocation policy, a virtual link may increase or decrease its capacity, for example, for a monetary incentive. VPN users send control packets whenever they want to resize their capacities, and the network handles them in an efficient and fair way. The simulation and analytic results in this paper show that our scheme is simple and robust such that the users and the network communicate using simple control packets and the link capacities are allocated efficiently.

  • Bandwidth Allocation for Connectionless Service in Private Networks Based on ATM Technology

    Tetsuya YOKOTANI  Toshihiro SHIKAMA  

     
    PAPER

      Vol:
    E77-B No:3
      Page(s):
    386-395

    Connectionless service for LANs interconnection will be provided in ATM networks at an early stage of B-ISDN era. This service will be provided on connection oriented mode at ATM technology. To perform this service, ATM connections using the dedicated bandwidth for this service are established semi-permanently between the nodes accommodating LANs. On these ATM connections, connectionless service among LANs is provided. It is important for private networks to utilize this bandwidth efficiently for reducing communication cost. In this paper, the architecture to provide connectionless service in private networks is described. Next, the allocation schemes of the bandwidth for this service and their performance are considered. We discuss the following schemes and compare them. One scheme is to establish semi-permanent ATM connections between the nodes with LAN interfaces. The bandwidth for each connection is individually assigned between these nodes. In another scheme, CLSFs (Connection-Less Service Functions) are introduced for connectionless service and connections are established via CLSFs. We show the latter scheme is superior because it brings out the effectiveness of statistical multiplexing of ATM technology and it leads to the reduction of the allocated bandwidth.

  • ATM Transport with Dynamic Capacity Control for Interconnection of Private Networks

    Katsuyuki YAMAZAKI  Yasushi WAKAHARA  

     
    PAPER

      Vol:
    E77-B No:3
      Page(s):
    327-334

    This paper deals with methods for interconnection between two local private networks that are geographically separated. A scheme is first presented to chain low bit-rate physical circuits into one logical circuit, over which ATM cells are transmitted as if there is one circuit with a high bit-rate capacity. In particular, use of existing low bit-rate circuits, e.g., 384/1536 kbit/s PDH leased line services and N-ISDN switched channels, is considered. The paper discusses two methods to permit chaining of physical circuits, and identifies their advantages and applications. By using the ATM-based circuit-chaining method, dynamic capacity control of the interconnection is then introduced with the use of an ATM-based rate adaptation. This is intended to provide a flexible and cost-effective capacity control compared to the existing TDM-based control. It is also possible to realize non-stop operation of changing capacity by establishment and release of chained circuits, which will lead to high reliability and robustness of private networks. Finally, delay characteristics introduced by the method are evaluated based on a computer simulation which gives a short and acceptable delay.

  • Service Aspects of Future Private Networks

    Kensaku KINOSHITA  Toshihiko WAKAHARA  Katsuhiko HARUTA  Shozo KUMON  

     
    INVITED PAPER

      Vol:
    E77-B No:3
      Page(s):
    306-313

    This paper describes a future private network service and the system configurations for providing it. Technologies and service trends in local area and wide area networks are shown. As network services become more diversified and integrated, it becomes more difficult for users to use the networks effectively. This paper shows how this problem can be solved by using virtual network technology to attain seamless networking. It also presents the concept of group networking among many parties, which can be used as the basis for a virtual private network.

  • Flexible Information Sharing and Handling System--Towards Knowledge Propagation--

    Yoshiaki SEKI  Toshihiko YAMAKAMI  Akihiro SHIMIZU  

     
    PAPER

      Vol:
    E77-B No:3
      Page(s):
    404-410

    The use of computers with private networks has accelerated the electronic storage of business information in office systems. With the rapid progress in processing capability and small sizing of the computer world, private networks are going to be more intelligent. The utilization of shared information is a key issue in modern organizations, in order to increase the productivity of white-collar workers. In the CSCW research field, it is said that informal and unstructured information is important in group work contexts but difficult to locate in a large organization. Many researchers are paying particular attention to the importance of support systems for such information. These kinds of information are called Organizational memory or Group Memory. Our research focuses on knowledge propagation with private networks in the organization. This means emphasis on the process; with which organized information or the ability to use information is circulated throughout the organization. Knowledge propagation has three issues: knowledge transmission, destination locating and source locating. To cope with these issues we developed FISH, which stands for Flexible Information Sharing and Handling system. FISH was designed to provide cooperative information sharing in a group work context and to explore knowledge propagation. FISH stores fragmental information as cards with multiple keywords and content. This paper discusses a three-layered model that describes computer supported knowledge transmission. Based on this model, three issues are discussed regarding knowledge propagation. FISH and its two-year experiment are described and knowledge propagation is explored based on the results of this experiment.

  • Multimedia Communication Protocols and Services for Broadband Private Networks

    Shiro SAKATA  

     
    INVITED PAPER

      Vol:
    E77-B No:3
      Page(s):
    283-293

    There has been growing interest in Broadband ISDN (B-ISDN) based on ATM (Asynchronous Transfer Mode) technologies, since ATM is expected to support a wide range of applications through high-speed and flexible multimedia communication capabilities. This paper reviews and discusses technical issues on multimedia communication protocols and services from the integration points of view of computer and communication technologies. An ISDN-based distributed multimedia and multi-party desktop conference system called MERMAID is introduced as an example which offers highly-sophisticated functions for remote collaborations among multiple users. This system, which was developed in early 1989 and has been used for daily research work since then, involves B-ISDN key technologies related to multimedia and multicast protocols, and computer architecture for groupware applications.

  • Throttled-Buffer Asynchronous Switch for ATM

    Kenneth J. SCHULTZ  P. Glenn GULAK  

     
    PAPER

      Vol:
    E77-B No:3
      Page(s):
    351-358

    Asynchronous Transfer Mode (ATM) shared buffer switches have numerous advantages, but have the principal disadvantage that all switch traffic must pass through the bottleneck of a single memory. To achieve the most efficient usage of this bottleneck, the shared buffer is made blockable, resulting in a switch architecture that we call "throttled-buffer", which has several advantageous properties. Shared buffer efficiency is maximized while decreasing both capacity and power requirements. Asynchronous operation is possible, whereby peak link data rates are allowed to approach the aggregate switch rate. Multicasting is also efficiently supported. The architecture and operation of this low-cost switch are described in detail.

  • A Corporate Communication Network Design Method Supported by Knowledge-Base

    Emi KATO  Shoichiro YAMASAKI  Hiroshi KOBAYASHI  

     
    PAPER

      Vol:
    E75-B No:7
      Page(s):
    609-616

    There has been much interest in building corporate private communication networks. This aim requires a method that optimizes the economical aspect of network configurations. The authors propose a network design method supported by knowledge-base. This method is used to design a cost-effective corporate communication network, using leased lines. The knowledge-base description depends on the production rule. The network configuration is improved by introducing expert knowledge, after designing the network by a conventional algorithm. Design results show the advantages of the proposed method.

  • A New Architecture for Flexible Private Networks--PBX/LAN Function Fusion--

    Jun YAMAGATA  Masayuki MIYAZAWA  Iwamasa NISHIKADO  Takafumi SAITO  

     
    PAPER

      Vol:
    E75-B No:7
      Page(s):
    585-593

    Over the past few years, the drive towards optimization and globalization of business activities has mandated the integration of various services, an increase in system scale, and the networking of a variety of systems. These requirements can only be satisfied by the introduction of systems that are able to accommodate and control multiple media and integrate LANs and PBXs synergistically. This paper proposes an architecture for next generation private networks called ANS (Areal Networking System) that is targeted at achieving flexible customization in an effort to meet a wide variety of user requirements as well as the ability to efficiently handle multimedia services. Based upon the clarification of various requirements on the ANS architecture, this paper defines two models for the ANS architecture. These models introduce modular building blocks in hierarchical structures that facilitate the custom design of networks. The key technologies for the ANS architecture are also discussed; for example, schemes for logically networking control functions by using virtual connections and a way to implement the LAN function.