Virtualization and Softwarization Technologies for End-to-end Networking

Similar documents
Information and Communication Management in the 5G Era for Connecting Cyberspace and Physical World

Cyber-Physical Chain (CPChain) Light Paper

Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data

Cross-Site Virtual Network Provisioning in Cloud and Fog Computing

Transformation Through Innovation

WHITE PAPER. Applying Software-Defined Security to the Branch Office

Vortex Whitepaper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

Overcoming Business Challenges in WAN infrastructure

Evolution of connectivity in the era of cloud

Automated Control and Orchestration within the Juniper Networks Mobile Cloud Architecture. White Paper

Application-Oriented Storage Resource Management

Benefits of a SD-WAN Development Ecosystem

ONAP CCVPN Blueprint Overview. ONAP CCVPN Blueprint Improves Agility and Provides Cross-Domain Connectivity. ONAP CCVPN Blueprint Overview 1

IPCOM EX Series for Realizing Network Stability and Safety

AT&T NetBond for Sungard Availability Services

NTT Com Press Conference March 1, 2016 #enterprisecloud

From Zero Touch Provisioning to Secure Business Intent

Hard Slicing: Elastic OTN and Wavelength Slicing

Multi SDO Workshop TM Forum Live

Connected Car Solutions Based on IoT

Huawei CloudFabric and VMware Collaboration Innovation Solution in Data Centers

SD-WAN Solution How to Make the Best Choice for Your Business

A Centrally Orchestrated SD-WAN Building a Green Ecosystem. --ZTE-SD-WAN Solution

Huawei SD-WAN Solution

Networking for a smarter data center: Getting it right

Making Enterprise Branches Agile and Efficient with Software-defined WAN (SD-WAN)

Accelerate Your Enterprise Private Cloud Initiative

Simplified service creation and delivery. Branch. SOHO Data Center. Control Center / NOC Packet Muse Service & Network Applications

A Global Operating System «from the Things to the Clouds»

Monitoring The Cloud. Service Providers View October 2017

Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video

Our Virtual Intelligent Network Overlay (VINO) solutions bring next-generation performance and efficiency to business networks throughout North

Zentera Systems CoIP Platform

Best Practices for Extending the WAN into AWS (IaaS) with SD-WAN

Nuage Networks Product Architecture. White Paper

Systems Engineering for Software-Defined Network Virtualisation. John Risson, Solutions Engineering Manager IP and Transport Engineering, Telstra

How Smart Networks are changing the Corporate WAN

Cloud Service Based on OSS

BROCADE CLOUD-OPTIMIZED NETWORKING: THE BLUEPRINT FOR THE SOFTWARE-DEFINED NETWORK

5G Vision for Future Networks From Use Cases to Implementation

Global IP Network System Large-Scale, Guaranteed, Carrier-Grade

Networking for a dynamic infrastructure: getting it right.

Technical White Paper on Cloud-based BNG with Control Plane and User Plane Separated Architecture

AT&T NetBond for SoftLayer

Next generation branch with SD-WAN and NFV

5G Network Control in ITU-T SG13: perspective and challenges

Network Behavior Analysis

TEN ESSENTIAL NETWORK VIRTUALIZATION DEFINITIONS

Optical network virtualization. Optical network virtualization. Transport SDN for cloud-centric networking

Fujitsu and the Next Generation Network Key Technology and Products for Service Providers and Web Companies

IEEE NetSoft 2016 Keynote. June 7, 2016

ONUG SDN Federation/Operability

COMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT SOFTWARE-DEFINED WIDE AREA NETWORKING (SD-WAN)

CT and IT architecture reconstruction based on software_. Global CTO

Bringing OpenStack to the Enterprise. An enterprise-class solution ensures you get the required performance, reliability, and security

IBM Cloud for VMware Solutions NSX Edge Services Gateway Solution Architecture

ITU-T Y Next generation network evolution phase 1 Overview

P10 P12 P21 P22. IMT-2020 (5G) Promotion Group 5G Network Technology Architecture White Paper

SD-WAN 101. November 3 rd 2016 Rob McBride Marketing

Integrating Autonomic Slice Networking in NFV

Cisco Designing the Cisco Cloud (CLDDES) Download Full version :

Introduction. Delivering Management as Agile as the Cloud: Enabling New Architectures with CA Technologies Virtual Network Assurance Solution

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues

UNIVERSITY OF CAGLIARI

China Unicom SDN Practice in WAN. Lv Chengjin/Ma Jichun, China Unicom

Proactnes II: Visualization for Next Generation Networks

Xceedium Xio Framework: Securing Remote Out-of-band Access

Supporting Customer Growth Strategies by Anticipating Market Change End-to-end Optimization of Value Chains

Mitigating Branch Office Risks with SD-WAN

Introducing Avaya SDN Fx with FatPipe Networks Next Generation SD-WAN

MPLS VPN Inter-AS Option AB

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS

ITU Workshop on Telecommunication Service Quality. Service assurance for Virtualized Networks and End-to-End Xhaul and C-RAN

Virtualized Network Services SDN solution for service providers

Transport SDN at OIF Assuring a Seamless Evolution to Interoperable Transport Networks of the Future

Cisco Cloud Architecture with Microsoft Cloud Platform Peter Lackey Technical Solutions Architect PSOSPG-1002

Enable Infrastructure Beyond Cloud

Udaipur, Rajasthan, India. University, Udaipur, Rajasthan, India

Enabling Smart Energy as a Service via 5G Mobile Network advances

Virtual Private Cloud. User Guide. Issue 03 Date

Network Systems for Emerging WAN Applications

GDPR Update and ENISA guidelines

Vodafone keynote. How smart networks are changing the corporate WAN. Peter Terry Brown Director of Connectivity & UC.

CLOUD STORAGE SPECIALIST Certification. Cloud Storage Specialist

A Perspective on Multi-Access Edge Computing. Frank Rayal. January San Francisco Singapore Dubai Paris

SDN and NFV: How they Will Change Your Network Operations. IAMU Annual Conference March 2015 Eric Lampland Lookout Point Communications

ELASTIC SERVICES PLATFORM

Technology to Operate and Maintain Transport System for Handling Spikes and Variations in Traffic

Delivering the Wireless Software-Defined Branch

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE

Gluon: An Enabler for NFV

Control System Security for Social Infrastructure

NEC Virtualized Evolved Packet Core vepc

Network Virtualisation Vision and Strategy_ (based on lesson learned) Telefónica Global CTO

I D C T E C H N O L O G Y S P O T L I G H T

Dedicated Hosted Cloud with vcloud Director

High-reliability, High-availability Cluster System Supporting Cloud Environment

Grid Computing with Voyager

Intelligent WAN: Leveraging the Internet Secure WAN Transport and Internet Access

Transcription:

ization and Softwarization Technologies for End-to-end Networking Naoki Oguchi Toru Katagiri Kazuki Matsui Xi Wang Motoyoshi Sekiya The emergence of 5th generation mobile networks (5G) and Internet of Things (IoT) technologies, as well as the continuous evolution of services, is creating an increasing need for easy and on-demand creation of network slices, which are logically isolated (closed) network spaces spanning user devices and the, tailored for individual businesses and services. While creating network slices within a single network infrastructure using software-defined networking (SDN) is possible, creating an end-to-end network slice across multiple network infrastructures remains a challenging task. Skilled network engineers must configure each infrastructure using different protocols and procedures and configure an array of virtual private networks (s) for interconnecting them. In this paper, we explain the issues associated with the creation, operation, and management of end-to-end network slices and our approach to addressing them by using virtualization and softwarization. Specifically, we present the One Network Architecture, which virtualizes multiple network infrastructures as one infrastructure and facilitates the creation of network slices on top of it. We also discuss several of the latest research topics such as information centric networking technology deployed over such network slices. 1. Introduction A network is typically configured by interconnecting physical devices such as s and es. These devices have their own data plane and control plane, and are operated autonomously and managed under distributed control [Table 1(a)]. Such a configuration can be advantageous because of its tolerance against partial failures owing to the autonomous control of data transfer by network elements. However, intelligent routing decision and comprehensive management based on knowledge of the entire network are difficult. Moreover, when a network configuration needs to be changed, cable connection/disconnection and reconfiguration of individual devices are necessary. As technology advances, data center servers and storage have become more virtualized, which Table 1 History of control technologies. (a) Previously (b) SDN era (c) Cloud era (d) Future Architecture C+D C+D C+D C D D D C C VD VD VD C D D D Content restriction C C C D 3D-VD D D Temporal restriction Spatial restriction Control method Autonomous distributed Single point centralized Centralized individually Centralized individually Bandwidth and performance assurance Link bandwidth assurance N/A Link bandwidth and performance assurance Link bandwidth and performance assurance C: Control plane D: Data plane VD: data plane 78 FUJITSU Sci. Tech. J., Vol. 53, No. 5, pp. 78 87 (September 2017)

N. Oguchi et al.: ization and Softwarization Technologies for End-to-end Networking in turn leads to stronger demand for network virtualization and softwarization. Today, the emergence of software defined networking (SDN) has made it possible to separate functions between the data plane and the control plane so that data plane operations can be performed through a single controller instead of configuring multiple devices individually. This enables users to define, control, and establish a virtual network by using software [Table 1(b)]. In addition, the use of network functions virtualization (NFV) technology enables more advanced softwarization of network functions. In recent years, the advent of new technologies such as the Internet of Things (IoT) and 5th generation mobile networks (5G) has created the need for storing large amounts of data generated by IoT devices for use in various fields such as big data analysis. In the computing era, it is assumed that networks can be used securely and efficiently by creating virtually separate end-to-end closed spaces (hereafter, network slices) from the device at a user location to the, depending on the type of business or service (Figure 1). To cope with these rapidly changing service demands, these network slices need to be flexible so that they can be readily built and modified on-demand without much human intervention. Also, for stable service provision, these network slices must be able to guarantee their link bandwidth and network processing performance. We propose a virtual data plane architecture that virtualizes different data planes in order to meet these requirements 6) [Table 1(c)]. There are spatial restrictions, which specify end points such as terminal devices and IoT devices, in the virtual data plane. We believe that there are also temporal and content restrictions. For temporal restrictions, virtual data planes may be created for the time specified. Content restrictions include the requirement that virtual data planes may be created on the basis of the content of the data. In the future, a 3D virtual data plane that satisfies all these demands will be required [Table 1(d)]. In this paper, we introduce a virtual data plane technology that enables quick, easy, and secure connections on-demand from a to a user location. We also describe our latest studies on future control technologies, including information centric networking technology based on information propagated in the virtual data plane. Network slice Corporate system Load balancer Slice for corporate system Network slice Slice for IoT system Big data analysis IoT gateway Controller Controller Controller Controller Controller Controller Controller Controller Terminal devices IoT devices Other company s Wide area network Own company s Wired network Wide area network Radio network Figure 1 End-to-end network slices. FUJITSU Sci. Tech. J., Vol. 53, No. 5 (September 2017) 79

N. Oguchi et al.: ization and Softwarization Technologies for End-to-end Networking 2. Challenges of building end-to-end network slices 2.1 Integrated management and creation of network slices across heterogeneous network infrastructures A virtual network is considered an option for ondemand establishment of a network slice. 2) A virtual network is a network composed of softwarized es and s within virtualization software used in server virtualization technologies or physical devices that can work under the SDN. A virtual network that realizes the required network can be built using SDN technology, as shown in Figure 2. However, when establishing an end-to-end network across network infrastructures operated by different corporations with different management policies, it is necessary to know the settings that are unique to each network infrastructure (Figure 3). Moreover, users must be made aware of the existence of virtual networks, such as a virtual private network () and/ or virtual extensible local area network (VXLAN) 3) used to connect network infrastructure, which can make it Logical network Router Convert to virtual network network Mapping to physical devices Physical network Physical device Physical device Physical device Figure 2 Mapping of logical network to physical network using SDN. SDN controller Other company s VXLAN SDN controller SDN controller Internet VXLAN network Physical device Fujitsu VXLAN: extensible local area network : private network Figure 3 Challenges when building a network across different network infrastructures. 80 FUJITSU Sci. Tech. J., Vol. 53, No. 5 (September 2017)

N. Oguchi et al.: ization and Softwarization Technologies for End-to-end Networking difficult for a person without network expertise to design a network. 2.2 Show universal resource as invariable resource The network slices required in IoT or 5G sometimes need stable resource such as link bandwidth and network processing performance. Equipped with virtual network functions realized with software on universal resource, end-to-end virtual networks tend to be vulnerable to the effects of other traffic or physical device failures. It is therefore necessary to have a mechanism making such performance vulnerability barely visible to users and to have the services work stably. 2.3 Automatic creation and modification of network slices The network slices required in IoT or 5G need to be created or deleted in accordance with explicit requests by users or service applications. In the future, network slices are expected to be automatically created over multiple network infrastructures by inferring user intentions without their explicit requests. This means that services will be more efficiently used through organic connections with the services they provide. A mechanism that can manage dynamic changes in the number of terminal devices and IoT devices joining the network slice is also needed. 3. One Network Architecture We propose the One Network Architecture, which enables network slices spanning heterogeneous network infrastructures to be handled by a single application programming interface (API) and address the aforementioned challenges. As shown in Figure 4, the One Network Architecture makes several network infrastructures look like a single virtual network infrastructure and controls Network slice Corporate system Load Balancer Slice for corporate system Network slice Slice for IoT system Big data analysis IoT gateway infrastructure controller infrastructure controller network infrastructure network infrastructure Terminal devices IoT devices Wired network Radio network Other company s Wide area network Own company s Wide area network Figure 4 One Network Architecture. FUJITSU Sci. Tech. J., Vol. 53, No. 5 (September 2017) 81

N. Oguchi et al.: ization and Softwarization Technologies for End-to-end Networking it with a single virtual infrastructure controller. The single API enables the user or an application to create a network slice across several network infrastructures by accessing only the virtual infrastructure controller. This enables the dynamic and automatic configuration of a network slice tailored for the business or service, making the use of services secure and stable. The following are some applications of the One Network Architecture. 3.1 Usage 1) New offices and shops When opening a new office or shop, the user can immediately access the business application needed at the site by connecting to the. Security is ensured by assigning a network slice appropriate for the terminal used and user type (Figure 5). 2) Factory line sharing This architecture enables a fabless factory without its own manufacturing facility to use an available shared factory line while configuring the necessary network slices, providing a secure network slice that prevents data from leaking to other factory lines. 3.2 Technologies to realize One Network Architecture We are developing technologies to configure the virtual network infrastructure needed to implement the One Network Architecture. They include technologies for abstracting the network infrastructure and associated technologies for automatic supplementation, optimum mapping, auto-scaling, and automatic recovery. We are also developing technology for the automatic creation of network slices as a function of a virtual infrastructure controller, wherein a network slice is automatically created depending on the user or service provided by the application. These technologies are described below. 1) Infrastructure abstraction technology We have developed a technology to create a virtual network infrastructure by using a software object (hereafter, virtual network object) and mapping multiple network infrastructures to it. The virtual network object shows the entire virtual network infrastructure that a user can use, and each network infrastructure is expressed as a sub-object contained in the virtual network object. The virtual network object is equipped with methods that respond to directions from the controller and events occurring in each infrastructure, in order to realize autonomous operation from these events. As shown in Figure 6, this enables the user to design a logical network over the virtual network object and easily build an end-to-end virtual network and manage it without being concerned about other connections, such as s across the network Application user management Role management User authentication Device authentication Basic operation application infrastructure controller High security network slice Automatically change access destination depending on role Normal operation application Other applications Normal corporation network slice Remote network slice GW for access Cloud Wide area network Offices and shops GW: Gateway Figure 5 Usage case: new office or shop. 82 FUJITSU Sci. Tech. J., Vol. 53, No. 5 (September 2017)

N. Oguchi et al.: ization and Softwarization Technologies for End-to-end Networking Automatic supplementation function Auto-recovery function Router Optimal allocation function Router Logical network Auto-scale function network object Life cycle Design Fujitsu Measures against problems Internet Creation network Operation Figure 6 Infrastructure abstraction technology. infrastructure. Moreover, the life cycle management of the end-to-end virtual network (design, configuration, operation, monitoring, maintenance, and disposal) can be treated as one for the logical network. We proposed the concept of the virtual network object as a technology to manage optical networks. 4),5) The application of this technology to the end-to-end virtual network management architecture resulted in a practical management system. 6),7) 2) Automatic supplementation technology To make user logical network design easier, we developed a technology to automatically supplement the functions required to build a virtual network by extracting the designer s intentions on the basis of the connection conditions between elements in the network. Checking the connections between elements at different levels, e.g., network infrastructures, subnets, and nodes located at both ends of the links, by looking at the links between the elements of the logical network designed by a user, as shown in Figure 7, the technology can predict the designer s intentions so that the desired functions of the virtual network are automatically supplemented. 3) Optimum mapping technology This technology can map virtual network functions to an end-to-end physical network consisting of multiple network infrastructures, such as multi-s, so that billing and performance are optimized. 4) Auto-scale and auto-recovery technology With some of the functions realized with software, a virtual network can become vulnerable to the effects of other traffic or physical device failures, which makes the assurance of bandwidth and/or performance difficult. If a virtual network object collects information on resources, communication quality, or failures and then decides which ones may be affected, the technology helps the service work in a stable manner by automatically increasing the number of virtual network functions and/or avoiding disturbances to minimize their impact on users without requiring the user s explicit countermeasures. 5) Technology for network slice automatic configuration We developed a technology that can automatically create a network slice by inferring the user s intentions so that the services provided by the can be automatically utilized. The technology has the following functions. Allocates gateways for access to enable collecting information on the properties and behaviors of devices, users, and applications at FUJITSU Sci. Tech. J., Vol. 53, No. 5 (September 2017) 83

N. Oguchi et al.: ization and Softwarization Technologies for End-to-end Networking user locations, etc. in order to gather information required for automatic creation of network slices depending on usage (Figure 8). Automatically analyzes and decides on requirements for the security and responsiveness of network slices depending on environmental changes involving devices, users, or applications. We aim to improve the adaptability to environmental changes and user experience quality by achieving a more sophisticated way of network slice creation using artificial intelligence. Logical network (192.168.2.0/24) (192.168.1.0/24) Fujitsu (192.168.3.0/24) network Automatic supplementation Fujitsu Internet : machine network function that is automatically supplemented Figure 7 Automatic supplementation technology. Analysis and decision on requirements for network slice infrastructure controller network created along with environmental changes such as terminal device, user, or application management Wide area network VNF Order management application, etc. Cloud Collect information stored at user sites by access GW VNF: network function Figure 8 Technology for automatic establishment of network slice. 84 FUJITSU Sci. Tech. J., Vol. 53, No. 5 (September 2017)

N. Oguchi et al.: ization and Softwarization Technologies for End-to-end Networking 4. Future challenges and prospects We have defined the One Network Architecture as a means to configure a spatial network slice depending on the location of the device or service. In the future, a mechanism wherein secure data can be easily shared between network slices owned by different companies, depending on details of the data or content, will be required. This section discusses how the future network will be formed and our efforts to address the challenges. Recently, there is an increasing number of new services created by orchestrating various services developed by different companies and connecting them through representational state transfer (REST) API. There are also demands to keep systems on each company s premises instead of deploying data in the owing to concerns over security and poor performance. Such cases require a system promoting the development and provision of new services through collaborations between services in the, as well as systems owned by different companies. In line with our efforts to realize this, we have been promoting R&D for a network technology called Private Digital Exchange (VPX), 8) a safe, secure, and easy way to share information located at different points in a wide area network, such as a or a company system, as Figure 9 shows. This technology creates a secure network slice that allows access to only certain types of data among multiple network slices that belong in a, wide area network, and several corporate offices. This enables secure and easy information sharing between participating users and services. VPX uses both blockchain and distributed web technologies to create a secure network corresponding to the data to be shared, as shown in Figure 10. The blockchain has the features of robust verification of transactions and ledger sharing. VPX takes advantages of them as functions of the network gateway responsible for data access. More specifically, these functions are for security management that allows sharing of approved data only with reliable users; identifying data and resolving addresses so that data requested by a user can be easily found and connected; and authentication and authorization when accessing data as well as trace management for traceability. Peer-to-peer connections are achieved by automatically configuring web interfaces for each set of data in a specific network slice in accordance with the data access request and opening address. Data are then encrypted prior to transmission for secure data sharing. 5. Conclusion The emergence of new technologies such as IoT, 5G, and advanced services has increased the need for easy and on-demand creation of network slices located across heterogeneous network infrastructures by users and/or applications providing services. In this paper, we discussed the One Network Architecture in which such end-to-end network slices Company A s slice Company B s slice Data Y Data X Network slice for each dataset Data a Data b Data Z Provide space where information can be securely and easily used and shared between different slices. Data c Cloud WAN Enterprise network Cloud WAN Enterprise network Figure 9 Conceptual drawing for VPX. FUJITSU Sci. Tech. J., Vol. 53, No. 5 (September 2017) 85

N. Oguchi et al.: ization and Softwarization Technologies for End-to-end Networking Network slice A Network slice B Data sharing via P2P Distributed web Authentication, authorization, and access control Data discovery and address resolution Setting of security policy for each dataset Blockchain API Application Gateway History of requests Data Data transmission Address notification Network slice made using blockchain technology Authentication, authorization, and trace management Internet/Carrier network History of publications Data sharing via P2P Distributed web Authentication, authorization, and access control Data discovery and address resolution Setting of security policy for each data set Blockchain Gateway API Application P2P: peer-to-peer connection Figure 10 Configuration of VPX technology. can be configured from one portal and the technologies to implement it. We believe that there will be a demand for an easy and secure information sharing system depending on the details of the data or content, anticipating situations in which there are more frequent exchanges and usages of the data generated through IoT or between different companies. We introduced the technologies we have been developing for such a system. Although these technologies are still under development and there are still a number of challenges to overcome, we will continue to promote research to create new services via networks. References 1) 5G PPP Architecture Working Group: View on 5G Architecture. https://5g-ppp.eu/white-papers/ 2) B. Sayadi et al.: SDN for 5G Mobile Networks: NORMA perspective. The 10th Competition Law and Economics European Network (CLEEN) Workshop, May 2016. 3) extensible Local Area Network (VXLAN): A Framework for Overlaying ized Layer 2 Networks over Layer 3 Networks. IETF RFC7348, Aug. 2014. 4) X. Wang et al.: Object-oriented Network ization An Evolution from SDN to SPN (Invited Paper). Photonic Networks and Devices (Networks) 2014 Paper NT1C.2, as part of Advanced Photonics for Communications Congress, San Diego, California, July 2014. 5) X. Wang et al.: SPN OS: Managing network services with virtual network objects. 2015 IEEE Conference on Network Function ization and Software Defined Network (NFV-SDN), pp. 149 155, San Francisco, CA, 2015. 6) N. Oguchi et al.: Proposal of building and operating method for end-to-end virtual networks. IEICE technical report NS2016-191, Vol. 116, No. 484, pp. 193 197, Mar. 2017. 7) Fujitsu Laboratories Ltd.: Fujitsu Develops Technology to Simplify Design and Operation of Hybrid- and Multi- Cloud Network Infrastructure. http://www.fujitsu.com/global/about/resources/news/ press-releases/2017/0307-01.html 8) Fujitsu Ltd.: Fujitsu Develops Blockchain-based Software for a Secure Data Exchange Network. http://www.fujitsu.com/global/about/resources/news/ press-releases/2017/0605-01.html Naoki Oguchi Fujitsu Laboratories Ltd. Mr. Oguchi is engaged in research and development for end-to-end virtual network management. Toru Katagiri Fujitsu Laboratories Ltd. Mr. Katagiri is engaged in research of network management. 86 FUJITSU Sci. Tech. J., Vol. 53, No. 5 (September 2017)

N. Oguchi et al.: ization and Softwarization Technologies for End-to-end Networking Kazuki Matsui Fujitsu Laboratories Ltd. Mr. Matsui is engaged in research and development of technology for network service infrastructure sophisticatedly connecting humans and things. Xi Wang Fujitsu Laboratories America, Inc. Mr. Wang is engaged in research of network softwarization. Motoyoshi Sekiya Fujitsu Laboratories Ltd. Mr. Sekiya is engaged in research and development of network systems. FUJITSU Sci. Tech. J., Vol. 53, No. 5 (September 2017) 2017 FUJITSU LIMITED 87