Author Search Result

[Author] Masayuki MURATA(115hit)

1-20hit(115hit)

  • FOREWORD Open Access

    Masayuki MURATA  Takeo ABE  

     
    FOREWORD

      Vol:
    E89-B No:9
      Page(s):
    2279-2279
  • FOREWORD Open Access

    Masayuki MURATA  

     
    FOREWORD

      Vol:
    E90-B No:8
      Page(s):
    1889-1889
  • TCP Congestion Control Mechanisms for Achieving Predictable Throughput Using Inline Network Measurement

    Go HASEGAWA  Kana YAMANEGI  Masayuki MURATA  

     
    PAPER-Network

      Vol:
    E91-B No:12
      Page(s):
    3945-3955

    Recently, real-time media delivery services such as video streaming and VoIP have rapidly become popular. For these applications requiring high-level QoS guarantee, our research group has proposed a transport-layer approach to provide predictable throughput for upper-layer applications. In the present paper, we propose a congestion control mechanism of TCP for achieving predictable throughput. It does not mean we can guarantee the throughput, while we can provide the throughput required by an upper-layer application at high probability when network congestion level is not so high by using the inline network measurement technique for available bandwidth of the network path. We present the evaluation results for the proposed mechanism obtained in simulation and implementation experiments, and confirm that the proposed mechanism can assure a TCP throughput if the required bandwidth is not so high compared to the physical bandwidth, even when other ordinary TCP (e.g., TCP Reno) connections occupy the link.

  • Requirements on ATM Switch Architectures for Quality-of-Service Guarantees

    Masayuki MURATA  

     
    INVITED PAPER

      Vol:
    E81-B No:2
      Page(s):
    138-151

    While active researches have been continuously made on the ATM switch architectures and the QoS service guarantees, most of them have been treated independently in the past. In this paper, we first explain the architectural requirement on the ATM switches to implement the mechanism of QoS guarantees in the context of ATM congestion control. Then we discuss how a vital link between two should be built, and remaining problems are pointed out.

  • Path Accommodation Methods for Unidirectional Rings with Optical Compression TDM

    Kazuhiro GOKYU  Ken-ichi BABA  Masayuki MURATA  

     
    PAPER

      Vol:
    E83-B No:10
      Page(s):
    2294-2303

    In this paper, we propose path accommodation methods for unidirectional rings based on an optical compression time-division multiplexing (OCTDM) technology. We first derive a theoretical lower bound on the numbers of slots and frames, in order to allocate all paths among nodes. Three path accommodation algorithms for the all-optical access are next proposed to achieve the lower bound as closely as possible. Path splitting is next considered to improve the traffic accommodation. Finally, we analyze the packet delay time for given numbers of slots/frames, which are decided by our proposed algorithms. Numerical examples are also shown to examine the effectiveness of our proposed algorithms including path accommodation and path splitting methods.

  • Proposal and Evaluation of a Function-Distributed Mobility Architecture for the Future Internet

    Gen MOTOYOSHI  Kenji LEIBNITZ  Masayuki MURATA  

     
    PAPER-Network

      Vol:
    E94-B No:7
      Page(s):
    1952-1963

    Several task forces have been working on how to design the future Internet in a clean slate manner and mobility management is one of the key issues to be considered. However, mobility management in the future Internet is still being designed in an “all-in-one” way where all management functions are tightly kept at a single location and this results in cost inefficiency that can be an obstruction to constructing flexible systems. In this paper, we propose a new function-distributed mobility management architecture that can enable more flexible future Internet construction. Furthermore, we show the effectiveness of our proposed system via a cost analysis and computer simulation with a random walk mobility model.

  • Traffic Engineering and Traffic Monitoring in the Case of Incomplete Information

    Kodai SATAKE  Tatsuya OTOSHI  Yuichi OHSITA  Masayuki MURATA  

     
    PAPER-Network

      Pubricized:
    2018/07/23
      Vol:
    E102-B No:1
      Page(s):
    111-121

    Traffic engineering refers to techniques to accommodate traffic efficiently by dynamically configuring traffic routes so as to adjust to changes in traffic. If traffic changes frequently and drastically, the interval of route reconfiguration should be short. However, with shorter intervals, obtaining traffic information is problematic. To calculate a suitable route, accurate traffic information of the whole network must be gathered. This is difficult in short intervals, owing to the overhead incurred to monitor and collect traffic information. In this paper, we propose a framework for traffic engineering in cases where only partial traffic information can be obtained in each time slot. The proposed framework is inspired by the human brain, and uses conditional probability to make decisions. In this framework, a controller is deployed to (1) obtain a limited amount of traffic information, (2) estimate and predict the probability distribution of the traffic, (3) configure routes considering the probability distribution of future predicted traffic, and (4) select traffic that should be monitored during the next period considering the system performance yielded by route reconfiguration. We evaluate our framework with a simulation. The results demonstrate that our framework improves the efficiency of traffic accommodation even when only partial traffic information is monitored during each time slot.

  • Improvement of TCP Throughput by Combination of Data and ACK Packets in Ad Hoc Networks

    Taichi YUKI  Takayuki YAMAMOTO  Masashi SUGANO  Masayuki MURATA  Hideo MIYAHARA  Takaaki HATAUCHI  

     
    PAPER-Ad Hoc Network

      Vol:
    E87-B No:9
      Page(s):
    2493-2499

    Since a radio channel is shared among terminals in an ad hoc network, packet collisions are frequent. In case of transmitting packets especially using TCP, data and ACK packets are transmitted in opposite directions on the same radio channel. Therefore, frequent collisions are unavoidable, and this seriously degrades TCP throughput. It is possible to transmit to two or more nodes which adjoin from a certain node simultaneously on the radio channel. To reduce the likelihood of packet collisions when an intermediate node transmits both data and ACK packets, these two types of packet can be combined and transmitted at the same time to increase the efficiency of radio channel utilization. In this paper, we propose a new technique to improve TCP performance by combining data and ACK packets. Our proposed technique is applicable to generic ad hoc networks easily. By means of a simulation using networks with various topologies, we have found that throughput can be improved by up to 60% by applying our proposed technique.

  • Analysis Evaluation of Parallel TCP: Is It Really Effective for Long Fat Networks?

    Zongsheng ZHANG  Go HASEGAWA  Masayuki MURATA  

     
    PAPER-Internet

      Vol:
    E90-B No:3
      Page(s):
    559-568

    Parallel TCP is one possible approach to increasing throughput of data transfer in Long Fat Networks (LFNs). Using parallel TCP is something of black art. As high-speed transport-layer protocols appear, e.g. HSTCP, it is necessary to reinvestigate the performance of parallel TCP, because a choice has to be make among them for the system. In this paper, the performance of parallel TCP is evaluated by mathematical analysis based on a simple dumbbell topology. Packet drop rate and aggregate goodput are used as two metrics to characterize the performance of parallel TCP. Two cases, namely synchronization and non-synchronization, are analyzed in detail when DropTail is deployed on routers. The synchronization case is common in using parallel TCP, but the goodput deteriorates seriously. The non-synchronization case may benefit parallel TCP, but extra mechanisms are required, and it is not easy to implement in the real world. The problem also remains even if Random Early Detection (RED) queue management is employed on routers. The analysis results show the difficulty in using parallel TCP in practice.

  • A Method to Reduce Inter-ISP Transit Cost Caused by Overlay Routing Based on End-to-End Network Measurement

    Kazuhito MATSUDA  Go HASEGAWA  Satoshi KAMEI  Masayuki MURATA  

     
    PAPER-Information Network

      Vol:
    E96-D No:2
      Page(s):
    289-302

    Overlay routing is an application-level routing mechanism on overlay networks. Previous researches have revealed that the overlay routing can improve user-perceived performance. However, it may also generate traffic unintended by ISPs, incurring additional monetary cost. In addition, since ISPs and end users have their own objectives respectively regarding traffic routing, overlay routing must be operated considering both standpoints. In the present paper, we propose a method to reduce inter-ISP transit costs caused by overlay routing from the both standpoints of ISPs and end users. To determine the relationships among ASes, which are required for ISP cost-aware routing, we construct a method to estimate a transit cost of overlay-routed paths from end-to-end network performance values. Utilizing the metric, we propose a novel method that controls overlay routing from the both standpoints of ISPs and end users. Through extensive evaluations using measurement results from the actual network environments, we confirm that the advantage of the proposed method whereby we can reduce the transit cost in the overlay routing and can control the overlay routing according to the objectives of both ISPs and end users.

  • FOREWORD

    Yuji INOUE  Hitoshi AIDA  Ichiro IIDA  Toshikazu KODAMA  Masayuki MURATA  Norio SHIRATORI  Shiro TANABE  Hisao UOSE  

     
    FOREWORD

      Vol:
    E80-B No:10
      Page(s):
    1381-1382
  • Prediction-Based Cloud Bursting Approach and Its Impact on Total Cost for Business-Critical Web Systems

    Yukio OGAWA  Go HASEGAWA  Masayuki MURATA  

     
    PAPER

      Pubricized:
    2017/05/16
      Vol:
    E100-B No:11
      Page(s):
    2007-2016

    Cloud bursting temporarily expands the capacity of a cloud-based service hosted in a private data center by renting public data center capacity when the demand for capacity spikes. To determine the optimal resources of a business-critical web system deployed over private and public data centers, this paper presents a cloud bursting approach based on long- and short-term predictions of requests to the system. In a private data center, a dedicated pool of virtual machines (VMs) is assigned to the web system on the basis of one-week predictions. Moreover, in both private and public data centers, VMs are activated on the basis of one-hour predictions. We formulate a problem that includes the total cost and response time constraints and conduct numerical simulations. The results indicate that our approach is tolerant of prediction errors and only slightly dependent on the processing power of a single VM. Even if the website receives bursty requests and one-hour predictions include a mean absolute percentage error (MAPE) of 0.2, the total cost decreases to half the existing cost of provisioning in the private date center alone. At the same time, 95% of response time is kept below 0.15s.

  • A Cooperative Mechanism for Hybrid P2P File-Sharing Networks to Enhance Application-Level QoS

    Hongye FU  Naoki WAKAMIYA  Masayuki MURATA  

     
    PAPER

      Vol:
    E89-B No:9
      Page(s):
    2327-2335

    Overlay networks, such as P2P, Grid, and CDN, have been widely deployed over physical IP networks. Since simultaneous overlay networks compete for network resources, their selfish behaviors to improve their application-oriented QoS disrupt each other. To enhance the collective performance and improve the QoS at the application level, we consider so-called the overlay network symbiosis where overlay networks cooperate with each other. In this paper, we proposed a cooperative mechanism for hybrid P2P file-sharing networks, where peers can find more files and exchange files with more peers. Through simulation experiments, we verified the effectiveness of cooperation from view points of application and system.

  • Effectiveness of Overlay Routing Based on Delay and Bandwidth Information

    Go HASEGAWA  Yuichiro HIRAOKA  Masayuki MURATA  

     
    PAPER-Network

      Vol:
    E92-B No:4
      Page(s):
    1222-1232

    Recent research on overlay networks has revealed that user-perceived network performance, such as end-to-end delay performance, could be improved by an overlay routing mechanism. However, these studies consider only end-to-end delay, and few studies have focused on bandwidth-related information, such as available bandwidth and TCP throughput, which are important performance metrics especially for long-lived data transmission. In the present paper, we investigate the effect of overlay routing both delay and bandwidth-related information, based on the measurement results of network paths between PlanetLab nodes. We consider three metrics for selecting the overlay route: end-to-end delay, available bandwidth, and TCP throughput. We then show that the available bandwidth-based overlay routing provides significant gain, as compared with delay-based routing. We further reveal the correlation between the latency and available bandwidth of the overlay paths and propose several guidelines for selecting an overlay path.

  • Performance Analysis of Large-Scale IP Networks Considering TCP Traffic

    Hiroyuki HISAMATSU  Go HASEGAWA  Masayuki MURATA  

     
    PAPER-Network Management/Operation

      Vol:
    E90-B No:10
      Page(s):
    2845-2853

    In this paper, we propose a novel analysis method for large-scale networks with consideration of the behavior of the congestion control mechanism of TCP. In the analysis, we model the behavior of TCP at end-host and network link as independent systems, and combine them into a single system in order to analyze the entire network. Using this analysis, we can analyze a large-scale network, i.e. with over 100/1,000/10,000 routers/hosts/links and 100,000 TCP connections very rapidly. Especially, a calculation time of our analysis, it is different from that of ns-2, is independent of a network bandwidth and/or propagation delay. Specifically, we can derive the utilization of the network links, the packet loss ratio of the link buffer, the round-trip time (RTT) and the throughput of TCP connections, and the location and degree of the network congestion. We validate our approximate analysis by comparing analytic results with simulation ones. We also show that our analysis method treats the behavior of TCP connection in a large-scale network appropriately.

  • Separating Predictable and Unpredictable Flows via Dynamic Flow Mining for Effective Traffic Engineering Open Access

    Yousuke TAKAHASHI  Keisuke ISHIBASHI  Masayuki TSUJINO  Noriaki KAMIYAMA  Kohei SHIOMOTO  Tatsuya OTOSHI  Yuichi OHSITA  Masayuki MURATA  

     
    PAPER-Internet

      Pubricized:
    2017/08/07
      Vol:
    E101-B No:2
      Page(s):
    538-547

    To efficiently use network resources, internet service providers need to conduct traffic engineering that dynamically controls traffic routes to accommodate traffic change with limited network resources. The performance of traffic engineering (TE) depends on the accuracy of traffic prediction. However, the size of traffic change has been drastically increasing in recent years due to the growth in various types of network services, which has made traffic prediction difficult. Our approach to tackle this issue is to separate traffic into predictable and unpredictable parts and to apply different control policies. However, there are two challenges to achieving this: dynamically separating traffic according to predictability and dynamically controlling routes for each separated traffic part. In this paper, we propose a macroflow-based TE scheme that uses different routing policies in accordance with traffic predictability. We also propose a traffic-separation algorithm based on real-time traffic analysis and a framework for controlling separated traffic with software-defined networking technology, particularly OpenFlow. An evaluation of actual traffic measured in an Internet2 network shows that compared with current TE schemes the proposed scheme can reduce the maximum link load by 34% (at the most congested time) and the average link load by an average of 11%.

  • A Study on Adaptive Scheduling Priority Control for Layered Cell Configuration

    Atsushi NAGATE  Teruya FUJII  Masayuki MURATA  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2016/09/15
      Vol:
    E100-B No:2
      Page(s):
    372-379

    The layered cell configuration, in which a large number of small cells are set in a macro-cell coverage area, is attracting much attention recently as a promising approach to handle the rapidly increasing mobile data traffic. In this configuration, cells of various sizes, from macro to small, are placed in various locations, so that the variation in the number and the distribution of the users among cells becomes much wider than in conventional macro-cell homogeneous networks. Therefore, even in the layered cell configuration, the users in the cell with many users and low received signal quality may experience low throughput especially at cell edge. This is because such users experience both low spectral efficiency and few radio resources. In order to resolve this issue, a lot of techniques have been proposed such as load balancing and cooperative multi-point transmission. In this paper, we focus on scheduling priority control as a simple solution that can also be used in combination with load balancing and coordinated multi-point transmission. We propose an adaptive scheduling priority control scheme based on the congestion and user distribution of each cell and clarify the effect of the proposed method by computer simulations.

  • FOREWORD Open Access

    Masayuki MURATA  

     
    FOREWORD

      Vol:
    E95-B No:5
      Page(s):
    1487-1487
  • An Approximate Analysis of a Prioritized Token Passing Method in Ring-Shaped Local Area Networks

    Takeshi NISHIDA  Masayuki MURATA  Hideo MIYAHARA  Kensuke TAKASHIMA  

     
    PAPER-Communication Networks

      Vol:
    E69-E No:1
      Page(s):
    29-39

    We present a new access protocol with priority functions in a ring-shaped local area network utilizing the token passing method. This protocol provides an asynchronous TDMA scheme to the terminals with the low class traffic, and the terminals with the high class traffic can transmit their messages between the consecutive transmissions of low class traffic. The protocol is shown to be effective for the environment where multifarious traffic is accommodated in the network. It gives the higher priority in transmission to the traffic which requires the real time transmission, while the lower priority is given to the one which may not require so strict real time transmission. We provide an approximate analytical method for obtaining the average message delay in our protocol. The performance of our protocol is compared with that of existing access protocol for two example network models, one is the network with balanced load and the other is not. As a result, it is observed in both the example networks that the characteristics of transmission delay for the messages with higher priority is much improved compared with other existing method without introducing much service degradation for lower priority traffic.

  • Analysis of Blacklist Update Frequency for Countering Malware Attacks on Websites

    Takeshi YAGI  Junichi MURAYAMA  Takeo HARIU  Sho TSUGAWA  Hiroyuki OHSAKI  Masayuki MURATA  

     
    PAPER-Internet

      Vol:
    E97-B No:1
      Page(s):
    76-86

    We proposes a method for determining the frequency for monitoring the activities of a malware download site used for malware attacks on websites. In recent years, there has been an increase in attacks exploiting vulnerabilities in web applications for infecting websites with malware and maliciously using those websites as attack platforms. One scheme for countering such attacks is to blacklist malware download sites and filter out access to them from user websites. However, a malware download site is often constructed through the use of an ordinary website that has been maliciously manipulated by an attacker. Once the malware has been deleted from the malware download site, this scheme must be able to unblacklist that site to prevent normal user websites from being falsely detected as malware download sites. However, if a malware download site is frequently monitored for the presence of malware, the attacker may sense this monitoring and relocate that malware on a different site. This means that an attack will not be detected until the newly generated malware download site is discovered. In response to these problems, we clarify the change in attack-detection accuracy caused by attacker behavior. This is done by modeling attacker behavior, specifying a state-transition model with respect to the blacklisting of a malware download site, and analyzing these models with synthetically generated attack patterns and measured attack patterns in an operation network. From this analysis, we derive the optimal monitoring frequency that maximizes the true detection rate while minimizing the false detection rate.

1-20hit(115hit)

FlyerIEICE has prepared a flyer regarding multilingual services. Please use the one in your native language.