Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Toru Mano is active.

Publication


Featured researches published by Toru Mano.


international conference on network protocols | 2014

Rethinking Packet Classification for Global Network View of Software-Defined Networking

Takeru Inoue; Toru Mano; Kimihiro Mizutani; Shin-ichi Minato; Osamu Akashi

In software-defined networking, applications are allowed to access a global view of the network so as to provide sophisticated functionalities, such as quality-oriented service delivery, automatic fault localization, and network verification. All of these functionalities commonly rely on a well-studied technology, packet classification. Unlike the conventional classification problem to search for the action taken at a single switch, the global network view requires to identify the network-wide behavior of the packet, which is defined as a combination of switch actions. Conventional classification methods, however, fail to well support network-wide behaviors, since the search space is complicatedly partitioned due to the combinations. This paper proposes a novel packet classification method that efficiently supports network-wide packet behaviors. Our method utilizes a compressed data structure named the multi-valued decision diagram, allowing it to manipulate the complex search space with several algorithms. Through detailed analysis, we optimize the classification performance as well as the construction of decision diagrams. Experiments with real network datasets show that our method identifies the packet behavior at 20.1 Mpps on a single CPU core with only 8.4 MB memory, by contrast, conventional methods failed to work even with 16 GB memory. We believe that our method is essential for realizing advanced applications that can fully leverage the potential of software defined networking.


IEEE Transactions on Network and Service Management | 2016

Efficient Virtual Network Optimization Across Multiple Domains Without Revealing Private Information

Toru Mano; Takeru Inoue; Dai Ikarashi; Koki Hamada; Kimihiro Mizutani; Osamu Akashi

Building optimal virtual networks across multiple domains is an essential technology for offering flexible network services. However, existing research is founded on an unrealistic assumption: providers will share their private information including resource costs. Providers, as well known, never actually do that so as to remain competitive. Secure multi-party computation, a computational technique based on cryptography, can be used to secure optimization, but it is too time consuming. This paper presents a novel method that can optimize virtual networks built over multiple domains efficiently without revealing any private information. Our method employs secure multi-party computation only for masking sensitive values; it can optimize virtual networks under limited information without applying any time-consuming techniques. It is solidly based on the theory of optimality and is assured of finding reasonably optimal solutions. Experiments show that our method is fast and optimal in practice, even though it conceals private information; it finds near optimal solutions in just a few minutes for large virtual networks with tens of nodes. This is the first work that can be implemented in practice for building optimal virtual networks across multiple domains.


international conference on network protocols | 2016

An efficient framework for data-plane verification with geometric windowing queries

Takeru Inoue; Richard Chen; Toru Mano; Kimihiro Mizutani; Hisashi Nagata; Osamu Akashi

Modern networks have complex configurations to provide advanced functions, but the complexity also makes them error-prone. Network verification is attracting attention as a key technology to detect inconsistencies between a configuration and a policy before deployment. Existing verifiers, however, either generally verify various properties over the policy at the cost of efficiency, or efficiently perform configuration analysis without paying much attention to the policy. This paper presents a novel framework of data-plane verification, which flexibly checks the inconsistency with great efficiency. For the purpose of generality, our framework formalizes a verification process with three abstract steps: each step is related to 1) packet behaviors defined by a configuration, 2) operator intentions described in a policy, and 3) the inspection of their relation. These steps work efficiently with each other on the simple quotient set of packet headers. This paper also reveals how the second step can be regarded as the windowing query problem in computational geometry. Two novel windowing algorithms are proposed with solid theoretical analyses. Experiments on real network datasets show that our framework with the windowing algorithms is surprisingly fast even when verifying the policy compliance; e.g., in a medium-scale network with thousands of switches, our framework reduces the verification time of all-pairs reachability from ten hours to ten minutes.


international conference on computer communications and networks | 2014

Efficient virtual network optimization across multiple domains without revealing private information

Toru Mano; Takeru Inoue; Dai Ikarashi; Koki Hamada; Kimihiro Mizutani; Osamu Akashi

Building optimal virtual networks across multiple domains is an essential technology to offer flexible network services. However, existing research is founded on an unrealistic assumption; providers will share their private information including resource costs. Providers, as is well known, never actually do that to remain competitive. Technically, secure multiparty computation, which is a computational technique based on the cryptography, can be used to secure optimization, but it is too time-consuming. This paper presents a novel method to optimize virtual networks built over multiple domains, with great efficiency but without revealing any private information. Our method employs secure multi-party computation but only for masking sensitive values; it can optimize virtual networks under limited information without any time-consuming technique. It is solidly based on the theory of optimality, and is assured of finding reasonably optimal solutions. Experiments show that our method is fast and optimal in practice even concealing private information; it finds nearly optimal solutions in just a few minutes for large virtual networks with tens of nodes. This is the first work that can be implemented in practice for building optimal virtual networks across multiple domains.


ieee international conference computer and communications | 2016

Reducing dense virtual networks for fast embedding

Toru Mano; Takeru Inoue; Kimihiro Mizutani; Osamu Akashi

Virtual network embedding has been intensively studied for a decade. The time complexity of most conventional methods has been reduced to the cube of the number of links. Since customers are likely to request a dense virtual network that connects every node pair directly (|E| = O(|V|2)) based on a traffic matrix, the time complexity is actually O(|E|3 = |V|6). If we were allowed to reduce this dense network into a sparse one before embedding, the time complexity could be decreased to O(|V|3); the time gap can be a million times for |V| = 100. The network reduction, however, combines several virtual links into a broader link, which makes the embedding cost (solution quality) much worse. This paper analytically and empirically investigates the trade-off between the embedding time and cost for the virtual network reduction. We define two simple reduction algorithms and analyze them with several interesting theorems. The analysis indicates that the embedding cost increases only linearly with exponential decay of embedding time. Thorough numerical evaluation justifies the desirability of the trade-off.


global communications conference | 2012

Streaming server management scheme for reducing power consumption

Kimihiro Mizutani; Toru Mano; Osamu Akashi; Tetsuo Kawano; Hiroshi Shimizu

In this paper, we propose an efficient video streaming server management scheme for streaming service that minimizes power consumption while satisfying clients requests. In conventional schemes, the power minimizing policy is calculated by means of simple dynamic programming or linear programing systems. However, these schemes may suffer changing the power minimizing policy substantially when the clients requests change even slightly. This increases the cost of changing streaming servers. On the other hand, our approach minimizes power consumption while satisfying clients requests by considering the number of times the policy is changed. To reduce the number of changes, our scheme uses dynamic programming by considering trends in clients requests and the stream length for each server. Evaluations shows that our scheme reduces power consumption by up to 35%–45% of conventional schemes.


global communications conference | 2012

Efficient query bundling mechanism in a DHT network

Kimihiro Mizutani; Toru Mano; Osamu Akashi; Kensuke Fukuda

A distributed hash table (DHT) network can be used for many distributed services and systems. In DHT networks, it takes logN look-up steps to search for required data where N is the number of nodes. However, the look-up process is redundant in the IP network because each look-up process generates a lot of communication among nodes. In massive data management such as sensor and web information management, this results in high network load even if each the search process takes only logN look-up steps. To solve this problem, we propose an efficient query bundling mechanism that makes it possible to bundle multiple queries by using range information. Range information consists of ID space information kept by a node. When a source node receives range information from a destination node, the source node matches all queries for the range information and forwards queries matching the range information to the destination node directly. This effectively reduces the number of look-up processes and the network load for the IP network. In addition, our mechanism can be implemented into conventional DHT networks and can easily be combined to effective DHT routing algorithms such as Chord, Kademlia, and Pastry. In evaluation, we implement our mechanism into DHT networks and compare its performance with that of conventional query bundling mechanisms. The results show that our mechanism reduces by up to 75% the total number of forwarding operations to put data compared with other mechanisms. In addition, our mechanism realizes the reduction of the number of forwarding operations per look-up process by up to 85% compared to other mechanisms.


international conference on distributed computing systems | 2017

A Proposal of an Efficient Traffic Matrix Estimation Under Packet Drops

Kohei Watabe; Toru Mano; Kimihiro Mizutani; Osamu Akashi; Kenji Nakagawa; Takeru Inoue

Traffic matrix (TM) estimation has been extensively studied for decades. Although conventional estimation techniques assume that traffic volumes are unchanged between origins and destinations, packets are often discarded on a path due to traffic burstiness, silent failures, etc. This paper proposes a novel TM estimation method that works correctly even under packet drops. The method is established on a Boolean fault localization technique; the technique requires fewer counters though it only determines whether each link is healthy. This paper extends the Boolean technique so as to deal with traffic volumes with error bounds just by a small number of counters. Along with submodular optimization for the minimum counter placement, we evaluate our method with real network datasets.


IEEE Transactions on Network and Service Management | 2017

An Efficient Framework for Data-Plane Verification With Geometric Windowing Queries

Takeru Inoue; Richard Chen; Toru Mano; Kimihiro Mizutani; Hisashi Nagata; Osamu Akashi

Modern networks have complex configurations to provide advanced functions. Network softwarization, a promising new movement in the networking community, could make networks more complexly configured due to the nature of software. Since these complexities make the networks error-prone, network verification is attracting attention as a key technology to detect inconsistencies between a configuration and an operational policy. Existing verifiers are, unfortunately, either inefficient or incomplete (operational policies are not rigorously checked). This paper presents a novel framework of data-plane verification. So as to efficiently manage the large search space defined by packet headers, our framework formalizes the consistency check by applying simple set operations defined in a small quotient space of packet header. This paper also reveals that the two spaces can be connected via the windowing query in computational geometry. Two windowing algorithms are proposed and backed by solid theoretical analyses. Experiments on real network datasets show that our framework with the windowing algorithms is surprisingly fast; when verifying policy compliance in a real network with thousands of switches, our framework reduces the verification time of all-pairs reachability from ten hours to ten minutes.


international conference on distributed computing systems | 2016

A Geometric Windowing Algorithm in Network Data-Plane Verification

Richard Chen; Toru Mano; Takeru Inoue; Kimihiro Mizutani; Hisashi Nagata; Osamu Akashi

Network verification is attracting attention as a key technology to detect configuration errors before deploying the network. In verification, a set of packets to be inspected is usually specified by a window -- a multi-dimensional rectangle defined by packet header fields (e.g., address prefixes and port ranges). Network operators have to know the forwarding behaviors of packets inside the window, this can be regarded as the windowing query problem in computation geometry. This paper proposes a novel windowing algorithm for network verification. Unlike existing windowing algorithms, our algorithm runs on a compressed data structure, because the search space has to be represented in a compressed form due to the space complexity.

Collaboration


Dive into the Toru Mano's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kazutoshi Fujikawa

Nara Institute of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Satoshi Matsuura

Nara Institute of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Kenji Nakagawa

Nagaoka University of Technology

View shared research outputs
Top Co-Authors

Avatar

Kensuke Fukuda

National Institute of Informatics

View shared research outputs
Top Co-Authors

Avatar

Kohei Watabe

Nagaoka University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge