|
Tutorial 1: Wed. Sept. 21, 2011, 9:00~10:30, 10:45~12:15, Room 401 |
||||
The Damage and Restoration of Backbone Networks Regarding the Great East Japan Earthquakes |
||||
Yukio Ito (NTT Communications, Japan) |
||||
![]() |
Japan has been well-known as one of quake-prone countries. Japan therefore is the most prepared country against earthquakes globally. |
|||
Technologies for Disaster Recovery and Measures in Access Network Systems |
||||
Hideaki Kimura (NTT Access Network Service Systems Labs., Japan) |
||||
![]() |
After Eastern Japan earthquake which introduced huge disaster on March 11th, 2011, we recognized again that the communication is very important as the lifeline as well as electricity, water service, and the gas. From the view point of construction for access networks with high reliability, we believe that network design including the distribution of data center, monitoring and control of networks, and physical-resistant technologies are important and necessary. Furthermore, we learned the importance of collaborating with the government and the local communities in realizing disaster-resistant communications because truly strong, resilient and still cost-effective city requires good city planning. This tutorial introduces the future research and development for access networks to improve earthquake-resistant construction technologies considering cost-effectiveness. |
|||
Emergency Management in Disaster-Resilient Society |
||||
Yuji Maeda (NTT Service Integration Labs., Japan) |
||||
![]() |
This tutorial introduces responses of the Japanese government, local governments, and lifeline companies for the 2011 off the Pacific coast of Tohoku Earthquake and a vision of a disaster resilient society that should be realized toward the major catastrophe predicted to occur in near future. A resilient society is a society that is resistant to and resilient in disasters and crises. The use of information using next-generation information and communication technology (ICT), and organization framework and emergency management based on the incident command system (ICS) is needed to realize it. |
|||
Tutorial 2: Wed. Sept. 21, 2011, 9:00~10:30, Room 402 C&D |
||||
Development of real-time application traffic classification system |
||||
Myung-Sup Kim (Korea Univ., Korea) |
||||
![]() |
The accurate classification of network applications or services responsible for network traffic flows offers substantial benefits to a number of essential areas in IP network engineering, management and surveillance. Internet traffic classification has been studied for a long period of time and a number of outstanding research results have been revealed based on various methods, such as header-based, payload-based, host-behavior-based, flow-statistics-based, etc. Nowadays industry and researcher are giving their attentions to the development of an application traffic classification system working on a high-speed network link in a real-time manner. This tutorial first covers various issues we have to consider in the development of a real-time application traffic classification system on a high-speed network link, where various recent classification methods will be covered in the perspective of their advantages and disadvantages. In the second part of this tutorial I will talk about our KU-MON traffic classification system which we developed and deployed on our campus network. This system pursues 100% of completeness and accuracy on a real operational network with over 1Gbps network link. |
|||
Tutorial 3: Wed. Sept. 21, 2011, 10:45~12:15, Room 402 C&D Cloud Application Performance Management Chair: Yen-Wen Chen (National Central Univ., Taiwan) |
||||
Application Performance Management in Cloud |
||||
Yeali Sun (National Taiwan Univ., Taiwan) |
||||
![]() |
An important concept in cloud computing is that “Cloud provides user an abstraction of infinite pool of resources and it will respond user requests in real time”. To realize the concept, one critical technology is the ability of performing dynamic scalable resource allocation and management by cloud service providers. Web applications have long been suffering from performance degradation and request blocking under unpredictable or unexpected workload increase when no extra resources are allocated for the use. Such dynamic workload fluctuations may be caused by incremental growth, time-of-day effects, and flash crowds. Recently, when more and more applications and services are moved to cloud environments, application performance management (APM) and guarantees have received a lot of attentions as an important management discipline for cloud services. A critical component of APM is the adoption of the service level agreement (SLA) for business critical applications. Successful APM on a virtualized cloud environment requires a holistic approach which must focus on several important topics such as performance isolation, performance monitoring, performance profiling, application placement and migration, and application engineering to enable quick identification and resolution of problems that may affect SLA. In this tutorial, we will highlight the main issues of and approaches to these important and interesting topics. |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |