The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper discuss and analyze the IPv6 deployment in Japan, from the view point of large scale multiple-stack layer 3 network development and deployment, focusing on the future network development. Since IPv6 network does not have compatibility with IPv4 network, it is considered the dual-stack operation is mandatory. However, when we analyze the IPv6 deployment in Japan, we realized that the integration...
With software defined networking rapidly becoming industry default, the cut-through mode of switching is becoming increasingly harder to achieve in practice. On the other hand, cut-through networking remains firmly in focus in several fields where top network performance is required, where supercomputing and datacenter interconnect are two popular examples. In earlier work, cut-through mode on end-to-end...
In wide area Layer 2 (L2) networks, there is a problem that broadcast packets for address resolution fill up link capacities. As a result, address resolution using Address Resolution Protocol (ARP), which uses broadcasts, cannot be used in wide area L2 networks. A conventional research has proposed an architecture using Distributed Hash Table (DHT) and ARP cache for reducing broadcasts. However, since...
Quality of experience that is perceived by customers directly affects reputation web service providers. Major web service providers locate intermediate computing resources between their contents servers and customers that assist quality enhancements of their service for their customers. For services using Internet of Things (IoT), there are strong interests in controlling intelligent IoT devices,...
The recent networking paradigm shifts towards the virtualization and softwarization of network functions, controls, and applications that are promising; they optimize costs and processes while bringing new value to the infrastructures. However, the centralized reliability management in softwarization architecture poses both scalability and latency challenges. In this paper, we design and build a novel...
Since traffic engineering (TE) in Software Defined Networking (SDN) can be much more efficiently and intelligently implemented, Multipath in SDN becomes a new option. However, Ternary Content Addressable Memory (TCAM) size become the bottleneck of SDN. In this paper, we propose an SDN-based Dynamic Flowentry-Saving Multipath (DFSM) mechanism for inter-DC WAN traffic forwarding. DFSM adopts source-destination-based...
Assigning network resources to Virtual Links (VLs) efficiently and on-demand is a challenging problem for any network virtualization solution. Known as the Virtual Link Mapping (VLM) problem, its objective is to compute the appropriate network paths with the required network resources that meet the quality of service expectations of arriving VLs while spreading the load over all nodes to maximise...
DTN (Delay/Disruption Tolerant Networking) inserts a new layer between the application layer (L7) and the transport layer (L4) for reliable communication on long-delay, intermittent, or lossy inks. Such a new layer, however, should provide not only a single rich service but also various rich services. We are proposing Layer-5 (L5) inserted between L7 and L4 to provide multiple rich services. One of...
Guaranteeing reliability in highly interfered environments is a challenging requirement of current and future wireless applications. A promising state-of-the-art solution for low-power wireless technologies, e.g., wireless sensor networks (WSNs), is frequency hopping aided with black- and white-listing of channels. Both methods, although increase reliability, sacrifice frequency resources. Extensive...
As 802.11 network has become an important infrastructure for the Mobile Internet, the performance of WLAN handoff is critical to the quality of user's experience. Although it has shown that there are a large number of invalid handoffs in large-scale 802.11 networks with dense AP, the reason and seriousness still remain unclear. In this paper, we propose HandoffAnalyser, a client-network collaborative...
This paper explores methodologies, advantages and challenges related to the use of the Information Centric Network technology for developing NoSQL distributed databases, which are expected to play a central role in the forthcoming IoT and BigData era. ICN services make possible to simplify the development of the database software, improve performance, and provide data-level access control. We use...
The recent development of stream delivery technology made Internet broadcasting services popular. In live Internet broadcasting, broadcasters or viewers often add video or sound effects (we call this kind of live broadcasting, ‘different worlds broadcasting’). Therefore, we have proposed a distributed Internet live broadcasting system with video and audio effects. In this paper, we describe the implementation...
Vehicles are increasingly equipped with sensors for safety applications. Sharing information among vehicles can further improve the safety of the overall transportation environment. Enabling each vehicle to get the “right information at the right time” can be valuable to avoid dangerous situations. Information-Centric Networks (ICN) that use the notion of “named-objects” enable information dissemination...
In the 5G era, it is expected that various services will be provided on network slices, which are virtualized network resources. Unlike the uniform service level provided in the current Internet, a network slice has to support multiple service levels for various types of services such as IP telephony, Internet-access and IoT/M2M. Because their requirements are quite different. IP telephony and Internet-access...
Over the past few years, network carriers have tended to consider their network function to be virtualized. It is possible to migrate virtualized network functions (VNFs) across datacenters for auto scaling and auto healing when traffic concentration or failure occurs. However, networks must provide a new network path corresponding to the new traffic flow generated by VNF migration. The problem is...
This paper describes a demo of OpenGeoBase, a NoSQL spatio-temporal distributed database that exploits Information Centric Network technology. We show its basic operations and two applications based on it. The first one is an Intelligent Transport System application making possible to discover public transport information (GTFS files) all over the world. The second application concerns a citizen reporting...
Many video streaming services employ the dynamic adaptive streaming over HTTP (DASH) technique to achieve better user's QoE. Named-data Networking (NDN) can bring many benefits to the video distribution with in-network cache and stateful forwarding. However, simply applying DASH technique to NDN causes problems. First, in-network cache may affect download time which makes bitrate adaptation a difficult...
Stateful programmable dataplanes are emerging as a disruptive technology and an enabler factor for network function virtualization in SDN environments. In this demo paper we show three real world use cases with stateful forwarding requirements to validate both the hardware and software implementations of the Open Packet Processor data plane.
In this article, the survivable routing problem on elastic optical networks (EONs) for single link-failure is studied. The failure-independent path-protecting p-cycles (FIPP p-cycles) protection scheme is used for request protection. Two heuristic algorithms are proposed to solve this problem.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.