The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We previously proposed a framework for autonomous decentralized control by introducing a partial differential equation based on local-action theory. Although each node in the network acts autonomously on the basis of only the local information directly available to it, our control proposal leads to optimal performance for the whole network. In addition, we have proposed flow control based on a diffusion...
In our previous work, we have proposed a block device layer called BDL-APT (Block Device Layer with Automatic Parallelism Tuning), which maximizes the performance of heterogeneous IP-SAN protocols in a long-fat network. In this paper, we evaluate the performance of BDL-APT with heterogeneous IP-SAN protocols (i.e., iSCSI, NBD and GNBD) in a long-fat network. We implemented BDL-APT as a layer of MD...
In this paper, we evaluate the performance of iSCSI-APT (iSCSI with Automatic Parallelism Tuning) in a real long-fat network, SINET3 (Science Information Network 3). iSCSI-APT is an initiator-side extension to the iSCSI protocol, and it automatically adjusts the number of multiple iSCSI connections for maximizing the iSCSI throughput. SINET3 provides a variety of advanced network services. One of...
In this paper, we reveal several characteristics of a broadcast communication protocol called DSCF (Directional-Store-Carry-Forward). In recent years, realization of VANETs (Vehicular Ad-hoc Networks) has been demanded for delivering information to vehicles at a low cost. In VANETs, a vehicle may or may not find other vehicles within its radio communication range because of vehicles' mobility, which...
In this paper, we present design and implementation of a flow level network simulator called FSIM+ (fluid based network SIMulator plus) for a network with heterogeneous flows transferred with different transport protocols: TCP, XCP, and UDP. In recent years, flow level network simulators, which can perform significantly faster simulation than conventional packet level network simulators, have been...
In this paper, we propose BDL-APT (block device layer with automatic parallelism tuning) that maximizes the throughput of IP-SAN protocols in long-fat networks. BDL-APT parallelizes data transfer using multiple IP-SAN sessions at a block device layer, and adjusts the number of active IP-SAN sessions automatically according to network status. A block device layer is a layer that receives read/write...
In this paper, we propose an efficient dynamic topology reconfiguration method for a service overlay network called ACBP (approximate cluster based policy), which does not require detailed information on future traffic requirements.Instead of the detailed information on future traffic requirements, ACBP utilizes community information of a social network among users for roughly estimating traffic requirements...
In this paper, we consider task scheduling in distributed computing. In distributed computing, it is possible that tasks fail, and it is difficult to get accurate information about hosts and tasks. WQR (workqueue with replication), which was proposed by Cirne et al., is a good algorithm because it achieves a short job-completion time without requiring any information about hosts and tasks. However,...
In this paper, a variety of link mining methods are handled in an integrated manner with previous data mining methods, and a network mining framework (NMF) is proposed. This paper also presents example usages of the NMF, and discusses how high-level network mining are achieved by using the NMF.
In this paper, we propose an iSCSI-APT (iSCSI with automatic parallelism tuning) that maximizes iSCSI throughput in long-fat networks. In recent years, as a protocol for building SANs (Storage Area Networks), iSCSI has been attracting attention for its low cost and high compatibility with existing networking infrastructure. However, it has been known that iSCSI throughput degrades in a long-fat network...
In this paper, we propose a novel communication paradigm called group-oriented communication. Different from conventional unicast-based communications, group-oriented communication is entirely based on group-based communication. Our group-oriented communication is essentially a type of many-to- many communication, but it realizes any type of communications including one-to-one, one-to-many, many-to-one...
Troubles in commercial IP telephony systems were reported one after another recently in Japan. One of important causes is congestion of control plane. In the current Internet, it has been recognized that controlling congestions caused by overload of control plane becomes important in addition to congestions caused by overload of data plane. In particular, since input traffic including retries tends...
In this paper, we present our implementation of GridFTP-APT (GridFTP with automatic parallelism tuning), an extension to GridFTP for optimizing its performance in a long-fat network. GridFTP has been used as a data transfer protocol for effectively transferring a large volume of data in Grid computing. GridFTP supports a feature called par allel data transfer that improves throughput by establishing...
In this paper, we propose a network architecture for realizing a group-based communication to solve issues of the Internet such as lack of security and low information S/N (Signal To Noise) ratio. We design a network architecture based on a multiple-association model. The proposed network architecture can realize high information S/N ratio by constructing multiple groups for different communication...
This paper proposes a secure networking platform, called SPX (secure networking platform for group-oriented exchange), which can solve certain problems in the Internet, such as phishing and spam. In the Internet, global reachability is maintained economically and the signal-to-noise ratio of contents is improved by collecting signal contents from the whole network. However, malicious users can access...
In this paper, we propose a recursive estimation method of node characteristics called RENC (recursive estimation of node characteristics) using the topological structure of a complex networks. RENC reduces the effect of noise by recursively estimating node characteristics using the topological structure of a network. In this paper, we also propose a network generation model called LRE (linkage with...
In this paper, we propose a framework called application concentrator, which enables interconnection of multiple closed networks at an application level. Because of rapid development and deployment of advanced networking technologies, various social activities have been shifting onto a network, thus necessitating a technology for providing closed networks for real/virtual groups. In particular, interconnection...
In this paper, we propose a flow-level simulator called FSIM (Fluid-based SIMulator) for performance evaluation of large-scale networks, and verify its effectiveness using our FSIM implementation. The notable features of our flow-level simulator FSIM are its accuracy and fast simulation execution compared with conventional flow-level simulators. For improving simulation accuracy, our flow-level simulator...
In this paper, we analyze stability of XCP (explicit control protocol) in a network with heterogeneous XCP flows (i.e., XCP flows with different propagation delays). Specifically, we model a network with heterogeneous XCP flows using fluid-flow approximation. We then derive the conditions that XCP control parameters should satisfy for stable XCP operation. Furthermore, through several numerical examples...
In this paper, we propose a simple but effective VPN mechanism called RING-VPN (ring-based virtual private network) that realizes a high scalability in terms of the number of VPNs. The key idea of our RING-VPN is to logically connect nodes in a ring topology for minimizing the number of IPsec tunnels. In our RING-VPN, each VPN node operates autonomously, making VPNs robust even in case of node and/or...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.