TRAN MINH QUANG - Academia.edu (original) (raw)

Papers by TRAN MINH QUANG

Research paper thumbnail of Mining the K-Most Interesting Frequent Patterns Sequentially

Lecture Notes in Computer Science, 2006

Conventional frequent pattern mining algorithms require users to specify some minimum support thr... more Conventional frequent pattern mining algorithms require users to specify some minimum support threshold, which is not easy to identify without knowledge about the datasets in advance. This difficulty leads users to dilemma that either they may lose useful information or may not be able to screen for the interesting knowledge from huge presented frequent patterns sets. Mining top-k frequent patterns allows users to control the number of patterns to be discovered for analyzing. In this paper, we propose an optimized version of the ExMiner, called OExMiner, to mine the top-k frequent patterns from a large scale dataset efficiently and effectively. In order to improve the user-friendliness and also the performance of the system we proposed other 2 methods, extended from OExMiner, called Seq-Miner and Seq-BOMA to mine top-k frequent patterns sequentially. Experiments on both synthetic and real data show that our proposed methods are much more efficient and effective compared to the existing ones.

Research paper thumbnail of Pinpoint: An Efficient Approach to Traffic State Estimation System Using Mobile Probes

2010 International Conference on Computational Intelligence and Software Engineering, 2010

Page 1. Pinpoint: An Efficient Approach to Traffic State Estimation System Using Mobile Probes Qu... more Page 1. Pinpoint: An Efficient Approach to Traffic State Estimation System Using Mobile Probes Quang Tran Minh Graduate school of Engineering Shibaura Institute of Technology, Tokyo Japan m709504@shibaura-it.ac.jp Eiji ...

Research paper thumbnail of Tree-based disaster recovery multihop access network

2013 19th Asia-Pacific Conference on Communications (APCC), 2013

ABSTRACT Wireless access network is an appropriate approach providing Internet connection in disa... more ABSTRACT Wireless access network is an appropriate approach providing Internet connection in disasters where communication infrastructures might completely be damaged. This paper clarifies essential requirements for a resilient disaster recovery multihop access network (DRAN). Based on those requirements, which could not be satisfied by existing access network technologies, a novel approach, thereby multihop access networks can be established quickly using commodity mobile devices (laptops, tablets, smart phones), has been proposed. Users can connect to the proposed wireless access network as easily as connecting to conventional access points (APs) and unconsciously contribute to the network extension. As a result, the network is extended incrementally providing more Internet access opportunities to far apart nodes. Experimental evaluations reveal the feasibility as well as the scalability of the proposed approach.

Research paper thumbnail of Assuring Accuracy on Low Penetration Rate Mobile Phone-Based Traffic State Estimation System

2011 IEEE Vehicular Technology Conference (VTC Fall), 2011

ABSTRACT This paper investigates the effect of the penetration rate on the effectiveness of the m... more ABSTRACT This paper investigates the effect of the penetration rate on the effectiveness of the mobile phone-based traffic state estimation. As a result, the acceptable penetration rate is identified. This recognition is useful for the investigating to bring the traffic state estimation using mobile phones as traffic probes into the real world application. In addition, an adaptive velocity-density estimation model, namely the velocity-density inference circuit, is proposed to improve the accuracy of the average velocity and the density estimations in cases of low penetration rate. Furthermore, a neural network-based prediction model is introduced to assure the effectiveness of the velocity/density estimation when the penetration rate degrades to zero. The experimental evaluations reveal the effectiveness as well as the robustness of the proposed solutions.

Research paper thumbnail of BS-3-25 Velocity Classification using Artificial Neural Network Towards Adaptive SCTP Handover Mechanism (BS-3. Management and Control Technologies for Innovative Networks)

Research paper thumbnail of On-site configuration of disaster recovery access networks made easy

Ad Hoc Networks, 2016

Catastrophic disasters can destroy large regions and, in the process, leave many victims isolated... more Catastrophic disasters can destroy large regions and, in the process, leave many victims isolated from the rest of the world. Recovering the communication infrastructure is typically slow and expensive, which is not suitable for emergency response. Multihop wireless access networks have the potential to quickly provide Internet connectivity to victims, but so far no simple and practical solution has been proposed to help people configure these networks easily. We are pursuing the approach of utilizing wireless virtualization techniques to establish wireless access networks on-the-fly using on-site mobile devices. While our previous work has demonstrated proof-of-concept solutions, it lacked fundamental communication abstractions, a rigorous design, and a thorough analysis on the effectiveness of these solutions. The main new contributions of this article are: (1) the wireless multihop communication abstraction (WMCA) as a fundamental communication concept for a practical tree-based disaster recovery access network (TDRAN), (2) the complete design and implementation details of TDRAN, and (3) a comprehensive analysis of the effectiveness of the proposed approach based on field experiments, both in indoor and outdoor settings, at different sites in Japan. The results demonstrate the effectiveness of the proposed solution for on-site configuration of wireless access networks, as it can easily extend to 20 hops by 15 m-distance and 16 hops by 30 m-distance networks, which result in 300 m and 480 m (respectively) in radius or about 1 km in diameter. This work also confirms that our approach is ready for realization as a real disaster recovery solution.

Research paper thumbnail of Improvement of Handover Performance Based on Bio-Inspired Approach with Received Signal Strength and Mean Opinion Score

Arabian Journal for Science and Engineering, 2015

In mobile communication environments, handover is a very important process to maintain mobile hos... more In mobile communication environments, handover is a very important process to maintain mobile host's connections to the network. Although a lot of researchers have tried to improve the handover performance, little deployment to satisfy the users can be seen in the real network due to the modification costs. In the current age, the existence of network with different radio access technologies has created a heterogeneous environment. Moreover, the mobile hosts available to users are becoming more sophisticated, which opens the opportunity for end-point approaches to alleviate the deployment issues. Furthermore, real-time applications such as VoIP and video conference are delay and quality sensitive, but not much research has considered qualitative requirement. Hence, a suitable technique is needed to alleviate the deployment issues as well as to cope with the stringent requirements of real-time applications. This paper presents a new end-point centric handover approach based on the ant colony probabilistic equation that utilizes the received signal strength and the mean opinion score to trigger the handover. Some simulations were conducted using OMNeT++ to measure the effectiveness of the proposed approach comparing with an existing method, the Endpoint Centric Handover B Muhammad Ariff Bin Baharudin

Research paper thumbnail of Uncertain Low Penetration Rate -- A Practical Issue in Mobile Intelligent Transportation Systems

2012 IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

Low penetration rate is one of the essential issues in the mobile phone based traffic state estim... more Low penetration rate is one of the essential issues in the mobile phone based traffic state estimation model. This paper proposes an appropriate genetic algorithm (GA) mechanism to optimize the traffic state estimation model even in cases of low penetration rate. This mechanism also reduces the critical penetration rate, thus improves the error-tolerance as well as the scalability of the traffic state estimation system. The paper also investigates the ANN-based prediction model to overcome the weakness of the GA-based traffic state estimation approach when the penetration rate becomes unacceptably low. In addition, the effect of different level related road segments on the prediction effectiveness is thoroughly discussed. Consequently, this study provides practically useful instructions in verifying the data missing rate at different level related road segments to ensure the prediction accuracy. The experimental evaluations reveal the effectiveness and the robustness of the proposed solutions.

Research paper thumbnail of MC-TES: An Efficient Mobile Phone Based Context-Aware Traffic State Estimation Framework

Journal of Information Processing, 2013

This paper proposes a notable mobile phone based context-aware traffic state estimation (MC-TES) ... more This paper proposes a notable mobile phone based context-aware traffic state estimation (MC-TES) framework whereby the essential issues of low and uncertain penetration rate are thoroughly resolved. A novel intelligent context-aware velocity-density inference circuit (ICIC) and a practical artificial neural network (ANN) based prediction approach are proposed. The ICIC model not only improves the traffic state estimation effectiveness but also minimizes the critical penetration rate required in the mobile phone based traffic state estimation (M-TES). The ANNbased prediction approach is considered as a complement of the ICIC in cases of an unacceptably low or unknown penetration rate. In addition, the difficulty in selecting the "right" traffic state estimation model, namely among the ICIC and the ANN, under the condition of an uncertain penetration rate is resolved. The experimental evaluations confirm the effectiveness, the feasibility as well as the robustness of the proposed approaches. As a result, this research contributes to accelerating the realization of mobile phone-based intelligent transportation systems (M-ITSs) or of the M-TES systems in specific.

Research paper thumbnail of B-15-7 An Efficient Data Collection Strategy on Traffic Estimation Using Mobile Phones

Research paper thumbnail of sFuzz

Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering

Research paper thumbnail of Dynamic Resource Provisioning on Fog Landscapes

Security and Communication Networks

A huge amount of smart devices which have capacity of computing, storage, and communication to ea... more A huge amount of smart devices which have capacity of computing, storage, and communication to each other brings forth fog computing paradigm. Fog computing is a model in which the system tries to push data processing from cloud servers to “near” IoT devices in order to reduce latency time. The execution orderings and the deployed places of services make significant effect on the overall response time of an application. Beside new research directions in fog computing, e.g., fog-cloud collaboration, service scalability, fog scalability, mobile fog computing, fog federation, trade-off between energy consumption and communication efficiency, duration of storing data locally, storage security and communication security, and semantic-aware fog computing, the service deployment problem is one of the attractive research fields of fog computing. The service deployment is a multiobjective optimization problem; there are so many proposed solutions for various targets, such as response time, c...

Research paper thumbnail of Task Placement on Fog Computing Made Efficient for IoT Application Provision

Wireless Communications and Mobile Computing

Fog computing is one of the promising technologies for realizing global-scale Internet of Things ... more Fog computing is one of the promising technologies for realizing global-scale Internet of Things (IoT) applications as it allows moving compute and storage resources closer to IoT devices, where data is generated, in order to solve the limitations in cloud-based technologies such as communication delay, network load, energy consumption, and operational cost. However, this technology is still in its infancy stage containing essential research challenges. For instance, what is a suitable fog computing scheme where effective service provision models can be deployed is still an open question. This paper proposes a novel multitier fog computing architecture that supports IoT service provisioning. Concretely, a solid service placement mechanism that optimizes service decentralization on fog landscape leveraging context-aware information such as location, response time, and resource consumption of services has been devised. The proposed approach optimally utilizes virtual resources availab...

Research paper thumbnail of IoT Services for Solving Critical Problems in Vietnam: A Research Landscape and Directions

IEEE Internet Computing, 2016

Critical problems, like food safety, traffic management, saltwater intrusion, and wastewater mana... more Critical problems, like food safety, traffic management, saltwater intrusion, and wastewater management, in Vietnam need novel Internet of Things (IoT) solutions. We analyze the current research and development situations in Vietnam and propose research actions to develop IoT services solving such problems.

Research paper thumbnail of Proposal of Periodicity Detection Method for Separation of Background Traffic (モバイルネットワークとアプリケーション)

電子情報通信学会技術研究報告 Ieice Technical Report 信学技報, Nov 18, 2014

Research paper thumbnail of BS-6-5 Intelligent Selection of Density-Velocity Estimation Models Using Mobile Multimedia(BS-6. Planning, Control and Management on Networks and Services)

電子情報通信学会ソサイエティ大会講演論文集, Aug 30, 2011

Research paper thumbnail of BS-7-55 Virtual-AP Extended Multihop Access Networks

電子情報通信学会ソサイエティ大会講演論文集, Sep 3, 2013

Research paper thumbnail of Toward an Efficient Mobile Phone Based Traffic Estimation System (マルチメディア通信と分散処理(DPS) Vol.2010-DPS-143)

Research paper thumbnail of Investigating the Performance of Link Aggregation on OpenFlow Switches

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2014

In this paper, we extensively explore the operation of Link Aggregation (LA) on OpenFlow switches... more In this paper, we extensively explore the operation of Link Aggregation (LA) on OpenFlow switches in comparison to the LA in conventional switches. The comparison of two LA implementations has been conducted in a real testbed under the UDP and TCP traffic loads. The testbed includes Pica8 P-3925 switches, which support two modes: an OpenFlow switch (i.e., using Open vSwitch) and a conventional switch (i.e., using the operating system called XorPlus). The evaluation results show that two LA implementations achieve similar performance in improving throughput. However, the XorPlus implementation provides a better resilience than the other. Specifically, the LA implementation on Xor-Plus spends less than 1.49538 seconds to switch the TCP traffic on the faulty link to the other links of a Link Aggregation Group (LAG) while the switchover time is four times longer on the Open vSwitch. In the case of UDP traffic, the maximum switchover time on the Open vSwitch is twice the one on XorPlus.

Research paper thumbnail of Increasing Resilience of OpenFlow WANs Using Multipath Communication

2013 International Conference on IT Convergence and Security (ICITCS), 2013

ABSTRACT Software-Defined Networking (SDN)/OpenFlow is recently recognized as an emerging technol... more ABSTRACT Software-Defined Networking (SDN)/OpenFlow is recently recognized as an emerging technology for network virtualization and programmability. In an OpenFlow network, forwarding (data) planes (i.e., OpenFlow switches) are distributed and remotely controlled by a so-called network controller, which centralizes the network's control functions. The centralized control model of SDN has been proven to be applicable in various deployments ranging from datacenter, campus networks to wide area networks (WANs). In the OpenFlow-based networks, the communication channel between the network controller and switches, which is defined in the scope of OpenFlow specification, plays the most important role. In this paper, we argue that in the state-of-the-art specification establishing one path between a switch and controller potentially decreases the resilience of OpenFlow WANs. Therefore, we propose to use multiple paths for each switch-controller communication and discuss applicable multipath technologies.

Research paper thumbnail of Mining the K-Most Interesting Frequent Patterns Sequentially

Lecture Notes in Computer Science, 2006

Conventional frequent pattern mining algorithms require users to specify some minimum support thr... more Conventional frequent pattern mining algorithms require users to specify some minimum support threshold, which is not easy to identify without knowledge about the datasets in advance. This difficulty leads users to dilemma that either they may lose useful information or may not be able to screen for the interesting knowledge from huge presented frequent patterns sets. Mining top-k frequent patterns allows users to control the number of patterns to be discovered for analyzing. In this paper, we propose an optimized version of the ExMiner, called OExMiner, to mine the top-k frequent patterns from a large scale dataset efficiently and effectively. In order to improve the user-friendliness and also the performance of the system we proposed other 2 methods, extended from OExMiner, called Seq-Miner and Seq-BOMA to mine top-k frequent patterns sequentially. Experiments on both synthetic and real data show that our proposed methods are much more efficient and effective compared to the existing ones.

Research paper thumbnail of Pinpoint: An Efficient Approach to Traffic State Estimation System Using Mobile Probes

2010 International Conference on Computational Intelligence and Software Engineering, 2010

Page 1. Pinpoint: An Efficient Approach to Traffic State Estimation System Using Mobile Probes Qu... more Page 1. Pinpoint: An Efficient Approach to Traffic State Estimation System Using Mobile Probes Quang Tran Minh Graduate school of Engineering Shibaura Institute of Technology, Tokyo Japan m709504@shibaura-it.ac.jp Eiji ...

Research paper thumbnail of Tree-based disaster recovery multihop access network

2013 19th Asia-Pacific Conference on Communications (APCC), 2013

ABSTRACT Wireless access network is an appropriate approach providing Internet connection in disa... more ABSTRACT Wireless access network is an appropriate approach providing Internet connection in disasters where communication infrastructures might completely be damaged. This paper clarifies essential requirements for a resilient disaster recovery multihop access network (DRAN). Based on those requirements, which could not be satisfied by existing access network technologies, a novel approach, thereby multihop access networks can be established quickly using commodity mobile devices (laptops, tablets, smart phones), has been proposed. Users can connect to the proposed wireless access network as easily as connecting to conventional access points (APs) and unconsciously contribute to the network extension. As a result, the network is extended incrementally providing more Internet access opportunities to far apart nodes. Experimental evaluations reveal the feasibility as well as the scalability of the proposed approach.

Research paper thumbnail of Assuring Accuracy on Low Penetration Rate Mobile Phone-Based Traffic State Estimation System

2011 IEEE Vehicular Technology Conference (VTC Fall), 2011

ABSTRACT This paper investigates the effect of the penetration rate on the effectiveness of the m... more ABSTRACT This paper investigates the effect of the penetration rate on the effectiveness of the mobile phone-based traffic state estimation. As a result, the acceptable penetration rate is identified. This recognition is useful for the investigating to bring the traffic state estimation using mobile phones as traffic probes into the real world application. In addition, an adaptive velocity-density estimation model, namely the velocity-density inference circuit, is proposed to improve the accuracy of the average velocity and the density estimations in cases of low penetration rate. Furthermore, a neural network-based prediction model is introduced to assure the effectiveness of the velocity/density estimation when the penetration rate degrades to zero. The experimental evaluations reveal the effectiveness as well as the robustness of the proposed solutions.

Research paper thumbnail of BS-3-25 Velocity Classification using Artificial Neural Network Towards Adaptive SCTP Handover Mechanism (BS-3. Management and Control Technologies for Innovative Networks)

Research paper thumbnail of On-site configuration of disaster recovery access networks made easy

Ad Hoc Networks, 2016

Catastrophic disasters can destroy large regions and, in the process, leave many victims isolated... more Catastrophic disasters can destroy large regions and, in the process, leave many victims isolated from the rest of the world. Recovering the communication infrastructure is typically slow and expensive, which is not suitable for emergency response. Multihop wireless access networks have the potential to quickly provide Internet connectivity to victims, but so far no simple and practical solution has been proposed to help people configure these networks easily. We are pursuing the approach of utilizing wireless virtualization techniques to establish wireless access networks on-the-fly using on-site mobile devices. While our previous work has demonstrated proof-of-concept solutions, it lacked fundamental communication abstractions, a rigorous design, and a thorough analysis on the effectiveness of these solutions. The main new contributions of this article are: (1) the wireless multihop communication abstraction (WMCA) as a fundamental communication concept for a practical tree-based disaster recovery access network (TDRAN), (2) the complete design and implementation details of TDRAN, and (3) a comprehensive analysis of the effectiveness of the proposed approach based on field experiments, both in indoor and outdoor settings, at different sites in Japan. The results demonstrate the effectiveness of the proposed solution for on-site configuration of wireless access networks, as it can easily extend to 20 hops by 15 m-distance and 16 hops by 30 m-distance networks, which result in 300 m and 480 m (respectively) in radius or about 1 km in diameter. This work also confirms that our approach is ready for realization as a real disaster recovery solution.

Research paper thumbnail of Improvement of Handover Performance Based on Bio-Inspired Approach with Received Signal Strength and Mean Opinion Score

Arabian Journal for Science and Engineering, 2015

In mobile communication environments, handover is a very important process to maintain mobile hos... more In mobile communication environments, handover is a very important process to maintain mobile host's connections to the network. Although a lot of researchers have tried to improve the handover performance, little deployment to satisfy the users can be seen in the real network due to the modification costs. In the current age, the existence of network with different radio access technologies has created a heterogeneous environment. Moreover, the mobile hosts available to users are becoming more sophisticated, which opens the opportunity for end-point approaches to alleviate the deployment issues. Furthermore, real-time applications such as VoIP and video conference are delay and quality sensitive, but not much research has considered qualitative requirement. Hence, a suitable technique is needed to alleviate the deployment issues as well as to cope with the stringent requirements of real-time applications. This paper presents a new end-point centric handover approach based on the ant colony probabilistic equation that utilizes the received signal strength and the mean opinion score to trigger the handover. Some simulations were conducted using OMNeT++ to measure the effectiveness of the proposed approach comparing with an existing method, the Endpoint Centric Handover B Muhammad Ariff Bin Baharudin

Research paper thumbnail of Uncertain Low Penetration Rate -- A Practical Issue in Mobile Intelligent Transportation Systems

2012 IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

Low penetration rate is one of the essential issues in the mobile phone based traffic state estim... more Low penetration rate is one of the essential issues in the mobile phone based traffic state estimation model. This paper proposes an appropriate genetic algorithm (GA) mechanism to optimize the traffic state estimation model even in cases of low penetration rate. This mechanism also reduces the critical penetration rate, thus improves the error-tolerance as well as the scalability of the traffic state estimation system. The paper also investigates the ANN-based prediction model to overcome the weakness of the GA-based traffic state estimation approach when the penetration rate becomes unacceptably low. In addition, the effect of different level related road segments on the prediction effectiveness is thoroughly discussed. Consequently, this study provides practically useful instructions in verifying the data missing rate at different level related road segments to ensure the prediction accuracy. The experimental evaluations reveal the effectiveness and the robustness of the proposed solutions.

Research paper thumbnail of MC-TES: An Efficient Mobile Phone Based Context-Aware Traffic State Estimation Framework

Journal of Information Processing, 2013

This paper proposes a notable mobile phone based context-aware traffic state estimation (MC-TES) ... more This paper proposes a notable mobile phone based context-aware traffic state estimation (MC-TES) framework whereby the essential issues of low and uncertain penetration rate are thoroughly resolved. A novel intelligent context-aware velocity-density inference circuit (ICIC) and a practical artificial neural network (ANN) based prediction approach are proposed. The ICIC model not only improves the traffic state estimation effectiveness but also minimizes the critical penetration rate required in the mobile phone based traffic state estimation (M-TES). The ANNbased prediction approach is considered as a complement of the ICIC in cases of an unacceptably low or unknown penetration rate. In addition, the difficulty in selecting the "right" traffic state estimation model, namely among the ICIC and the ANN, under the condition of an uncertain penetration rate is resolved. The experimental evaluations confirm the effectiveness, the feasibility as well as the robustness of the proposed approaches. As a result, this research contributes to accelerating the realization of mobile phone-based intelligent transportation systems (M-ITSs) or of the M-TES systems in specific.

Research paper thumbnail of B-15-7 An Efficient Data Collection Strategy on Traffic Estimation Using Mobile Phones

Research paper thumbnail of sFuzz

Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering

Research paper thumbnail of Dynamic Resource Provisioning on Fog Landscapes

Security and Communication Networks

A huge amount of smart devices which have capacity of computing, storage, and communication to ea... more A huge amount of smart devices which have capacity of computing, storage, and communication to each other brings forth fog computing paradigm. Fog computing is a model in which the system tries to push data processing from cloud servers to “near” IoT devices in order to reduce latency time. The execution orderings and the deployed places of services make significant effect on the overall response time of an application. Beside new research directions in fog computing, e.g., fog-cloud collaboration, service scalability, fog scalability, mobile fog computing, fog federation, trade-off between energy consumption and communication efficiency, duration of storing data locally, storage security and communication security, and semantic-aware fog computing, the service deployment problem is one of the attractive research fields of fog computing. The service deployment is a multiobjective optimization problem; there are so many proposed solutions for various targets, such as response time, c...

Research paper thumbnail of Task Placement on Fog Computing Made Efficient for IoT Application Provision

Wireless Communications and Mobile Computing

Fog computing is one of the promising technologies for realizing global-scale Internet of Things ... more Fog computing is one of the promising technologies for realizing global-scale Internet of Things (IoT) applications as it allows moving compute and storage resources closer to IoT devices, where data is generated, in order to solve the limitations in cloud-based technologies such as communication delay, network load, energy consumption, and operational cost. However, this technology is still in its infancy stage containing essential research challenges. For instance, what is a suitable fog computing scheme where effective service provision models can be deployed is still an open question. This paper proposes a novel multitier fog computing architecture that supports IoT service provisioning. Concretely, a solid service placement mechanism that optimizes service decentralization on fog landscape leveraging context-aware information such as location, response time, and resource consumption of services has been devised. The proposed approach optimally utilizes virtual resources availab...

Research paper thumbnail of IoT Services for Solving Critical Problems in Vietnam: A Research Landscape and Directions

IEEE Internet Computing, 2016

Critical problems, like food safety, traffic management, saltwater intrusion, and wastewater mana... more Critical problems, like food safety, traffic management, saltwater intrusion, and wastewater management, in Vietnam need novel Internet of Things (IoT) solutions. We analyze the current research and development situations in Vietnam and propose research actions to develop IoT services solving such problems.

Research paper thumbnail of Proposal of Periodicity Detection Method for Separation of Background Traffic (モバイルネットワークとアプリケーション)

電子情報通信学会技術研究報告 Ieice Technical Report 信学技報, Nov 18, 2014

Research paper thumbnail of BS-6-5 Intelligent Selection of Density-Velocity Estimation Models Using Mobile Multimedia(BS-6. Planning, Control and Management on Networks and Services)

電子情報通信学会ソサイエティ大会講演論文集, Aug 30, 2011

Research paper thumbnail of BS-7-55 Virtual-AP Extended Multihop Access Networks

電子情報通信学会ソサイエティ大会講演論文集, Sep 3, 2013

Research paper thumbnail of Toward an Efficient Mobile Phone Based Traffic Estimation System (マルチメディア通信と分散処理(DPS) Vol.2010-DPS-143)

Research paper thumbnail of Investigating the Performance of Link Aggregation on OpenFlow Switches

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2014

In this paper, we extensively explore the operation of Link Aggregation (LA) on OpenFlow switches... more In this paper, we extensively explore the operation of Link Aggregation (LA) on OpenFlow switches in comparison to the LA in conventional switches. The comparison of two LA implementations has been conducted in a real testbed under the UDP and TCP traffic loads. The testbed includes Pica8 P-3925 switches, which support two modes: an OpenFlow switch (i.e., using Open vSwitch) and a conventional switch (i.e., using the operating system called XorPlus). The evaluation results show that two LA implementations achieve similar performance in improving throughput. However, the XorPlus implementation provides a better resilience than the other. Specifically, the LA implementation on Xor-Plus spends less than 1.49538 seconds to switch the TCP traffic on the faulty link to the other links of a Link Aggregation Group (LAG) while the switchover time is four times longer on the Open vSwitch. In the case of UDP traffic, the maximum switchover time on the Open vSwitch is twice the one on XorPlus.

Research paper thumbnail of Increasing Resilience of OpenFlow WANs Using Multipath Communication

2013 International Conference on IT Convergence and Security (ICITCS), 2013

ABSTRACT Software-Defined Networking (SDN)/OpenFlow is recently recognized as an emerging technol... more ABSTRACT Software-Defined Networking (SDN)/OpenFlow is recently recognized as an emerging technology for network virtualization and programmability. In an OpenFlow network, forwarding (data) planes (i.e., OpenFlow switches) are distributed and remotely controlled by a so-called network controller, which centralizes the network's control functions. The centralized control model of SDN has been proven to be applicable in various deployments ranging from datacenter, campus networks to wide area networks (WANs). In the OpenFlow-based networks, the communication channel between the network controller and switches, which is defined in the scope of OpenFlow specification, plays the most important role. In this paper, we argue that in the state-of-the-art specification establishing one path between a switch and controller potentially decreases the resilience of OpenFlow WANs. Therefore, we propose to use multiple paths for each switch-controller communication and discuss applicable multipath technologies.