Rajitha Tennekoon
Keio University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Rajitha Tennekoon.
International Journal of Computer Applications | 2013
Erwin Harahap; Janaka Wijekoon; Rajitha Tennekoon; Fumito Yamaguchi; Shinichi Ishida; Hiroaki Nishi
The increase of digital data between content’s servers and clients in a network causes congestion problems when downloading big web contents including files, streaming media, etc. The problem becomes pronounced when a narrow bandwidth or unexpected termination of streaming services is appeared. Content Delivery Network (CDN) is introduced to overcome such problems by redirect client’s request to the best server which proximal and least loaded. However, with intensity increase of people accessing a particular content, the performance of CDN is reduced and sometimes congested. We propose an architecture to solve such problems with a new method to redirect client’s request through a special router called Service-oriented Router (SoR). In this paper, several analytical studies and experiments have been conducted and the result show that router-based redirection is more effective than DNS-based redirection that is currently being used. SoR has been introduces as a content-based router and has capability to do deep packet inspection (DPI) into the packet streams and analyze them. We use SoR in our proposed method as a CDN’s core-router to redirect client’s request to the best server. Our experiment conducted with model and numerical analytic supported by optimal redirection probability based on delay between router and server. The experiment result confirmed that the router-based redirection reduced the response time by 23.3% compared to the DNSbased redirection.
international workshop on advanced motion control | 2014
Erwin Harahap; Janaka Wijekoon; Rajitha Tennekoon; Fumito Yamaguchi; Shinichi Ishida; Hiroaki Nishi
Network Management System (NMS) plays an important role in networks to maintain the best performance of a network. It employs variety of tools, applications, and devices in order to support network administrators to monitor and maintain the stability of a network. Fault management is part where the NMS dealing with problems and failures, such as congestion, in the network. Generally, most NMSs use Simple Network Management Protocol (SNMP) to monitor and map network availability, performance, and error rates. In the existing NMS process, an SNMP agent is deployed to get information about the network condition and then send them to the administrator for taking further action on solving the problems. However, deploying such agent to the network may increase the traffic density. On the other hand, packet latency and RTT will increase as well. In this paper, we implemented a prototype of the proposing novel system that no need to deploy such agent to obtain network information. Our system analyze the streaming traffic by implementing a Service-oriented Router (SoR). Our objective is to predict a congestion in the specific link in the network through a router-based data traffic analysis using a Bayesian network model. The purpose of the prediction is to support the network administrator to notify the early warning regarding to the fault in the network as long as possible before it actually happening. By this prediction, the network administrator can immediately taking action to avoid the problems.We provided simulation experiment to demonstrate the performance of the proposed system. Our simulation results show that the proposed system can predict a congestion link caused by a particular problem, before hand it is getting congested.
international conference on smart grid communications | 2016
Tomoya Imanishi; Rajitha Tennekoon; Hiroaki Nishi
Electrical load monitoring, by means of a smart meter, is getting more and more popular these days. Power demand information from smart meters is drawing attention among researchers, since it could be applied for power demand control. Providing attractive services with smart meters encourage electricity retailers to utilize demand side management, which could be a solution for energy-related problems in our society. In this paper, a novel service is proposed by classifying private information from the household electricity usage. The private information is estimated using feature vectors extracted from time series analysis of power demand information. In order to extract feature vectors effectively, two extraction methods were proposed: simple statistical method, and Discrete Fourier Transform (DFT) based extraction method. Then, Support Vector Machines (SVMs) classifier is carried out after the optimization of hyper-parameters. As the estimated information, both family structure and floor space were selected. The classification result is evaluated using F-measure and accuracy. As a result, the accuracy of DFT-based classification was superior to the statistical method for detecting the floor space in a house.
Procedia Computer Science | 2014
Rajitha Tennekoon; Janaka Wijekoon; Erwin Harahap; Hiroaki Nishi
Abstract It is a well-known fact that the Internet traffic travels through public networks. These networks lack security and are vulnerable. Encryption and public key cryptography are important technologies that are used to preserve data security and integrity, and to reduce information theft on the public networks. However, the existing routing protocols are incapable of providing secure data transmission on public networks. To this end, our laboratory introduced the Service-oriented Router (SoR) to maintain rich information for the next-generation networks by shifting the current Internet infrastructure to an information-based and an open-innovation platform. An SoR can analyze all packet stream transactions on its interfaces and store them in high throughput databases. Using the features of the SoR, in this paper, we propose a hop-by-hop routing protocol that provides per-hop data encryption. This infrastructure is proposing to preserve both the security and the privacy of data that traverses through public networks. We implemented a prototype of per-hop data encryption protocol on the ns-3 simulator and the results obtained are discussed in this paper.
simulation tools and techniques for communications, networks and system | 2015
Janaka Wijekoon; Rajitha Tennekoon; Erwin Harahap; Hiroaki Nishi
In network research, network simulators have been shown to be useful for testing and changing network protocols by means of a controlled manner. As an Internet systems simulator, ns-3 simulator provides an ideal simulation environment for network research. However, ns-3 is lack of table-driven IPv4 routing modules. Despite the fact that a routing protocol is a mandatory component of a network, it is necessary to introduce a table-driven routing protocol for the ns-3 which is able to maintain the network connectivity and consistency. To this end, we introduce a distance vector IPv4 wired routing protocol for the ns-3 simulator (DVRP). The proposing protocol is developed as a table-driven wired routing protocol. In this study, we describe the proposing routing protocol, including its design, implementation, behavior on networks, and limitations.
global communications conference | 2013
Erwin Harahap; Janaka Wijekoon; Rajitha Tennekoon; Fumito Yamaguchi; Hiroaki Nishi
The increase in the amount of digital data transferred between contents Servers and Clients in a network causes problems created by congestion when downloading big web files, streaming media, etc. Content Delivery Networks (CDNs) are introduced to overcome such problems by redirecting the Clients request to the nearest Server. However, as the number of people accessing Internet increases rapidly, the performance of CDN is reduced, resulting in network congestion at times. To solve these problems, we propose an architecture in which a new management method is employed to redirect the Clients request using a content-based Router called the Service-oriented Router (SoR). This method is more effective than the currently implemented, traditional DNS-based request redirection (RR). The SoR is a special router that can perform a deep packet inspection of the packet streams. Our experiments were based on analytical modeling as well as test bed experiments, and they confirmed that the response time in the Router-based RR was less than that in the DNS-based RR by 23.3%. In addition, our test bed experiments showed that the RTT in the Router-based RR is less than that in the DNS-based RR by 7.7%.
conference of the industrial electronics society | 2015
Tomoya Imanishi; Rajitha Tennekoon; Peter Palensky; Hiroaki Nishi
Prevailing low energy buildings attracts lots of attention in the world. Many studies have contributed in introducing higher thermal efficiency towards rooms with low energy heating, ventilation, and air-conditioning (HVAC) systems. However, current HVAC systems do not consider CO2 concentration change and thermal contribution towards human bodies in a room. This paper presents a novel method to predict thermal dynamics, including person count. Occupancy data are dynamically estimated by CO2 concentration and thermal contribution from the human bodies. The model is formulated as a resistor-capacitor circuit (RC circuit) in the Modelica modeling language. All parameters in a simulation are identified using actual building data during the winter season in Japan. Results are validated using measured information of actual building environment, and the test results concluded an improvement of absolute percentage error by 0.16 % over the conventional model. From the test results, it was concluded that the moving average filter of 20 minutes was an appropriate mean time to represent the time delay value.
international workshop on advanced motion control | 2014
Rajitha Tennekoon; Janaka Wijekoon; Erwin Harahap; Hiroaki Nishi; Eiichi Saito; Seiichiro Katsura
Bilateral controllers are widely used vital technology to perform remote operations and telesurgeries. The nature of the bilateral controller enables control objects, which are geographically far from the operation location. Therefore, the control data has to travel through public networks. As a result, to maintain the effectiveness and the consistency of applications such as teleoperations and telesurgeries, faster data delivery and data integrity are essential. The Service-oriented Router (SoR) was introduced to maintain the rich information on the Internet and to achieve maximum benefit from networks. In particular, the security, privacy and integrity of bilateral communication are not discoursed in spite of its significance brought by its underlying skill information or personal vital information. An SoR can analyze all packet or network stream transactions on its interfaces and store them in high throughput databases. In this paper, we introduce a hop-by-hop routing protocol which provides hop-by-hop data encryption using functions of the SoR. This infrastructure can provide security, privacy and integrity by using these functions. Furthermore, we present the implementations of proposed system in the ns-3 simulator and the test result shows that in a given scenario, the protocol only takes a processing delay of 46.32 μs for the encryption and decryption processes per a packet.
international conference on information and automation | 2014
Shanika Ekanayake; Rajitha Tennekoon; Ajantha S. Atukorale
Enormous content distribution systems improved broadly with the rapid growth of novel and innovative technologies. Peer-to-peer (P2P) content distribution network (CDN) technologies such innovative technological improvement which claims low cost, efficient high demand data distribution and it gradually involves to the next-generation CDNs. Communications among the nodes of such open network infrastructures commonly perceived as an environment offering both opportunities and threats, which are based on trust issues. Thus, a trust mechanism is required to establish secure communication between the content delivery nodes. This paper introduces a novel, decentralized, cooperative and self-organized reputation based trust algorithm to mitigate the security complications of CDNs. To illustrate the trust model, a novel P2P hybrid network infrastructure has been introduced. The key notion of the research is to validate trust of the target before send or accept the traffic. Furthermore, performance of the proposed trust algorithm is evaluated through the ns-2 simulator in order to analyze the trusted and untrusted behavior of the P2P content delivery nodes.
cyber-enabled distributed computing and knowledge discovery | 2013
Erwin Harahap; Janaka Wijekoon; Rajitha Tennekoon; Fumito Yamaguchi; Shinichi Ishida; Hiroaki Nishi
Extending Content Delivery Network (CDN) infrastructure that has features of router-based network management system (RNMS) is highly appealing and challenging. It allows developing a CDN architecture based upon standard design to ease interoperability, scalability, performance, and flexibility both on network monitoring and management controlled from a router. To better understand the system model, necessity, and the advantages of RNMS, this paper proposed an algorithm that distributed in to a special router called Service-oriented Router (SoR). The function of algorithm is to manage the effective and efficient number of replica server runs in the network. In CDN, minimizing the number of activated replica servers should be considered in order to reduce the operation cost of the system. We propose a semantic approached algorithm that has function to optimize the selection of active replica servers which managed from SoR. The algorithm has capability to find the best location of replica servers and performs load balancing among replica servers. Our simulation result indicates that the proposed algorithm can efficiently activate the replica servers according to users request with 33.9% effective compared to other algorithm within about one millisecond RTT increase.