The search functionality is under construction.

Author Search Result

[Author] Takuya ASAKA(23hit)

21-23hit(23hit)

  • PRIOR: Prioritized Forwarding for Opportunistic Routing

    Taku YAMAZAKI  Ryo YAMAMOTO  Takumi MIYOSHI  Takuya ASAKA  Yoshiaki TANAKA  

     
    PAPER-Network

      Vol:
    E100-B No:1
      Page(s):
    28-41

    In ad hoc networks, broadcast forwarding protocols called OR (opportunistic routing) have been proposed to gain path diversity for higher packet delivery rates and shorter end-to-end delays. In general backoff-based OR protocols, each receiver autonomously makes a forwarding decision by using certain metrics to determine if a random backoff time is to be applied. However, each forwarder candidate must wait for the expiration of the backoff timer before forwarding a packet. Moreover, they cannot gain path diversity if the forwarding path includes local sparse areas, and this degrades performance as it strongly depends on the terminal density. In this paper, we propose a novel OR protocol called PRIOR (prioritized forwarding for opportunistic routing). In PRIOR, a terminal, called a prioritized forwarder and which forwards packets without using a backoff time, is selected from among the neighbours. In addition, PRIOR uses lightweight hop-by-hop retransmission control to mitigate the effect of terminal density. Moreover, we introduce an enhancement to PRIOR to reduce unnecessary forwarding by using an explicit acknowledgement. We evaluate PRIOR in comparison with conventional protocols in computer simulations.

  • ABdis: Approach to Estimating the Distribution of Available Bandwidth for Multimedia QoS Control and Management

    Hiroki NISHIKAWA  Takuya ASAKA  Tatsuro TAKAHASHI  

     
    PAPER

      Vol:
    E89-B No:2
      Page(s):
    364-372

    This paper proposes ABdis, a new active measurement method for estimating the available bandwidth on a communication network path. Due to the recent explosion in multimedia applications, it is becoming increasingly important to manage network QoS, and tools that can measure network quality precisely are necessary to do this. Many conventional active measurement methods/tools, however, can measure/estimate only the average of the available bandwidth in a given period but cannot measure its distribution. If the distribution of the bandwidth over short intervals can be measured, the information would be useful for network management, proxy selection, and end-to-end admission control. We propose an end-to-end active measurement method called ABdis, which can estimate the distribution of the available bandwidth in a network path. ABdis employs multiple probes having different rates and a parameter-matching technique for estimating distribution. Furthermore, we present the results of simulations and verify ABdis's performance under various conditions by changing probe parameters, amount of cross traffic, and network models.

  • Leaky-Bucket-with-Gate Algorithm for Connection-Setup Congestion Control in Multimedia Networks

    Takumi KIMURA  Takuya ASAKA  

     
    PAPER-Switching and Communication Processing

      Vol:
    E80-B No:3
      Page(s):
    448-455

    A leaky-bucket-with-gate algorithm is proposed to control connection-setup congestion in telecommunication networks providing multimedia services, in place of the call-gapping algorithm used in telephone networks. Multimedia services may use more than one connection simultaneously, while standard telephone services use only one connection at a time. A set of connections used to construct a multimedia service is called a correlated connection group, and the setup requests of such a group form correlated request group. A correlated request group is assumed to be accepted into the network only when all the connection-setup requests for the group are accepted. In this paper, the proposed leaky-bucket-with-gate algorithm, a pure leaky-bucket algorithm, and a call-gapping algorithm are evaluated by simulating traffic with a mix of correlated and uncorrelated connection-setup requests, which models setup requests for video conferencing and telephone services. The simulation results show that the proposed algorithm accepts correlated request groups more efficiently than the pure leaky-bucket and call-gapping algorithms under the simulated traffic conditions, except when the interarrival time in a correlated request group is longer than the acceptance interval. We also present queueing analysis for determining the control parameters in the proposed algorithm. Implementation of this algorithm will facilitate the handling of both setup request traffic for correlated connection groups and for uncorrelated connections in multimedia networks.

21-23hit(23hit)