We have developed a dedicated onboard “sensor” utilizing wireless communication devices for collision avoidance around road intersections. The “sensor” estimates the positions of transmitters on traffic participants by comparing the strengths of signals received by four ZigBee receivers installed at the four corners of a vehicle. On-board sensors involving cameras cannot detect objects in non line-of-sight (NLOS) area caused by buildings and other vehicles. Although infrastructure sensors for vehicle-to-infrastructure (V2I) cooperative systems can detect such hidden objects, they are substantially more expensive than on-board sensors. The on-board wireless “sensor” developed in this work would function as an alternative tool for collision avoidance around intersections. Herein, we extend our previous work by considering a road surface reflection model to improve the estimation accuracy. By using this model, we succeeded in reducing the error mismatches between the observed data and the calibration data of the estimation algorithm. The proposed system will be realized on the basis of these enhancements.
Xuan ZHANG Hao LIU Fulong JIANG Zhiqun LI
Duty-cycle MAC protocols achieve high energy-efficiency. However, duty-cycle MACs introduce significant end-to-end delivery latency. Recently proposed protocols such as RMAC and PRMAC improve the latency of duty-cycle MAC protocols by employing a mechanism of multi-hop wakeup reservation to allow a packet to be forwarded over multiple hops in a single communication cycle. However, these protocols can not efficiently handle cross traffic bursts which are common in applications with space-correlated event detection. If there are multiple packets to send in each flow, most of the data packets will be seriously postponed. This paper proposes a multi-channel pipelined routing-enhanced MAC protocol, called MPR-MAC, to handle this problem. By jointly employing channel diversity and time diversity, MPR-MAC allows cross data flows to forward multiple packets respectively in a single communication cycle without interfering with each other. Simulation results show the advantage of MPR-MAC in handling cross data flows and the significant performance upgrade in terms of end-to-end latency and energy efficiency.
Nikolaos TRIANTAFYLLOU Petros STEFANEAS Panayiotis FRANGOS
The Open Mobile Alliance (OMA) Order of Rights Object Evaluation algorithm causes the loss of rights on contents under certain circumstances. By identifying the cases that cause this loss we suggest an algebraic characterization, as well as an ordering of OMA licenses. These allow us to redesign the algorithm so as to minimize the losses, in a way suitable for the low computational powers of mobile devices. In addition we provide a formal proof that the proposed algorithm fulfills its intent. The proof is conducted using the OTS/CafeOBJ method for verifying invariant properties.
IEEE802.11 Wireless Local Area Networks (WLANs) are becoming more and more pervasive due to their simple channel access mechanism, Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), but this mechanism provides all nodes including Access Point and other Stations with the same channel access probability. This characteristic does not suit the infrastructure mode which has so many downlink flows to be transmitted at the Access Point that congestion at the Access Point is more likely to occur. To resolve this asymmetry traffic problem, we develop an Optimal Contention Window Adjustment method assuming the condition of erroneous channels over WLANs. This method can be easily implemented and is compatible with the original CSMA/CA mechanism. It holds the ratio of downlink and uplink flows and at the same time achieves the maximum saturation throughput in the WLANs. We use the Markov Chain analytical model to analyze its performance and validate it through the simulations.
Ki Sup HONG Sang Hoon LEE Lynn CHOI
Existing MANET routing protocols may not be efficient for mobile sensor networks (MSNs) since they generate too much control traffic by relying on flooding or route maintenance messages. Furthermore, peer-to-peer communication patterns assumed in MANET would exacerbate the traffic around sink nodes in MSNs. In this paper we propose traffic adaptive routing (TAR) for MSNs; it can reduce the control packets by analyzing and predicting the source, volume, and the patterns of both traffic and mobility. Through its analysis and the prediction of mobility, TAR also copes with dynamic topology changes by carrying out a fast route recovery process. Our theoretical analysis shows that TAR can effectively reduce unnecessary control packet flooding by 53% on average when compared to AODV. We implement TAR on NS-2. Our experimental evaluation confirms that TAR can not only improve the network and energy performance for MSNs but also can be a practical routing solution for MANET and WSNs compared to the existing ad hoc routing protocols.
Daichi TAKEUCHI Katsunori MAKIHARA Mitsuhisa IKEDA Seiichi MIYAZAKI Hirokazu KAKI Tsukasa HAYASHI
We have fabricated highly-dense Si nano-columnar structures accompanied with Si nanocrystals on W-coated quartz, and characterized their local electrical transport in the thickness direction using atomic force microscopy (AFM) with a conductive cantilever. By applying DC negative bias to the bottom W electrode with respect to a grounded top electrode made of 10-nm-thick Au on the sample surface, current images reflecting highly-localized conduction were obtained in both contact and non-contact modes. This result is attributable to electron emission due to quasi-ballistic transport through Si nanocrystals via nanocolumnar structure.
YoungHwa JANG InCheol SHIN Byung-gil MIN Jungtaek SEO MyungKeun YOON
Critical infrastructures are falsely believed to be safe when they are isolated from the Internet. However, the recent appearance of Stuxnet demonstrated that isolated networks are no longer safe. We observe that a better intrusion detection scheme can be established based on the unique features of critical infrastructures. In this paper, we propose a whitelist-based detection system. Network and application-level whitelists are proposed, which are combined to form a novel cross-layer whitelist. Through experiments, we confirm that the proposed whitelists can exactly detect attack packets, which cannot be achieved by existing schemes.
Masayuki NAKADA Tatsunori OBARA Tetsuya YAMAMOTO Fumiyuki ADACHI
In this paper, a direct/cooperative relay switched single carrier-frequency division multiple access (SC-FDMA) using amplify-and-forward (AF) protocol and spectrum division/adaptive subcarrier allocation (SDASA) is proposed. Using SDASA, the transmit SC signal spectrum is divided into sub-blocks, to each of which a different set of subcarriers (resource block) is adaptively allocated according to the channel conditions of mobile terminal (MT)-relay station (RS) link, RS-base station (BS) link, and MT-BS link. Cooperative relay does not always provide higher capacity than the direct communication. Switching between direct communication and cooperative relay is done depending on the channel conditions of MT-RS, RS-BS, and MT-BS links. We evaluate the achievable channel capacity by the Monte-Carlo numerical computation method. It is shown that the proposed scheme can reduce the transmit power by about 6.0 (2.0) dB compared to the direct communication (the cooperative AF relay) for a 1%-outage capacity of 3.0 bps/Hz.
Peng GONG Ping LI Duk Kyung KIM
In this letter, unlike the previous work in [2], the optimal power allocation in a non-orthogonal, amplify-and-forward (AF) relay-assisted transmission is investigated in the uplink. Here, the inter-user-interference among the signals from MTs and relays exists due to non-zero interference suppression factor (ISF), i.e., finite spreading factor. In this letter, we show that the optimal solution to achieve a 'max-min fairness' among mobile terminals can be alternatively obtained by solving its inverse problem. The impact of various ISFs as well as the Jain's fairness is investigated in comparison with the equal power allocation.
Youhua FU Wei-Ping ZHU Chen LIU Feng LU Hua-An ZHAO
This paper presents a joint linear processing scheme for two-hop and half-duplex distributed amplify-and-forward (AF) relaying networks with one source, one destination and multiple relays, each having multiple antennas. By using the minimum mean-square error (MMSE) criterion and the Wiener filter principle, the joint relay and destination design with perfect channel state information (CSI) is first formulated as an optimization problem with respect to the relay precoding matrix under the constraint of a total relay transmit power. The constrained optimization with an objective to design the relay block-diagonal matrix is then simplified to an equivalent problem with scalar optimization variables. Next, it is revealed that the scalar-version optimization is convex when the total relay power or the second-hop SNR (signal to noise ratio) is above a certain threshold. The underlying optimization problem, which is non-convex in general, is solved by complementary geometric programming (CGP). The proposed joint relay and destination design with perfect CSI is also extended for practical systems where only the channel mean and covariance matrix are available, leading to a robust processing scheme. Finally, Monte Carlo simulations are undertaken to demonstrate the superior MSE (mean-square error) and SER (symbol error rate) performances of the proposed scheme over the existing relaying method in the case of relatively large second-hop SNR.
Yoshiaki KIRIHA Motoo NISHIHARA
In recent years, technologies and markets related to data centers have been rapidly changing and growing. Data centers are playing an important role in ICT infrastructure deployment and promise to become common platforms for almost all social infrastructures. Even though research has focused on networking technologies, various technologies are needed to develop high-performance, cost-efficient, and flexible large-scale data centers. To understand those technologies better, this paper surveys recent research and development efforts and results in accordance with a data center network taxonomy that the authors defined.
We propose a novel network traffic matrix decomposition method named Stable Principal Component Pursuit with Frequency-Domain Regularization (SPCP-FDR), which improves the Stable Principal Component Pursuit (SPCP) method by using a frequency-domain noise regularization function. An experiment demonstrates the feasibility of this new decomposition method.
An automotive operating system is a typical safety-critical software and therefore requires extensive analysis w.r.t its effect on system safety. Our earlier work [1] reported a systematic model checking approach for checking the safety properties of the OSEK/VDX-based operating system Trampoline. This article reports further performance improvement using embeddedC constructs for efficient verification of the Trampoline model developed in the earlier work. Experiments show that the use of embeddedC constructs greatly reduces verification costs.
Joon-Young CHOI Hongju KIM Soonman KWON
We address the global asymptotic stability of FAST TCP, especially considering cross traffics, time-varying network feedback delay, and queuing delay dynamics at link. Exploiting the inherent dynamic property of FAST TCP, we construct two sequences that represent the lower and upper bound variations of the congestion window in time. By showing that the sequences converge to the equilibrium point of the congestion window, we establish that FAST TCP in itself is globally asymptotically stable without any specific conditions on the tuning parameter α or the update gain γ.
Kang Yong LEE Jinsul KIM Kee Seong CHO Won RYU Ho-Jin LEE
In this letter, we propose a new QoS scheduling algorithm, referred to as the explicit traffic aware scheduling algorithm with explicit queue length notification (ETA-EQN), which aims at supporting multimedia services in HCCA of IEEE 802.11e WLAN. The results from intensive simulations with NS-2 verify that ETA-EQN provides much better network performance than the reference scheduler in terms of throughput, delay, and packet loss.
Yasuhiro IKEDA Ryoichi KAWAHARA Noriaki KAMIYAMA Tatsuaki KIMURA Tatsuya MORI
We analyze measured traffic data to investigate the characteristics of TCP quality metrics such as packet retransmission rate, roundtrip time (RTT), and throughput of connections classified by their type (client-server (C/S) or peer-to-peer (P2P)), or by the location of the connection host (domestic or overseas). Our findings are as follows. (i) The TCP quality metrics of the measured traffic data are not necessarily consistent with a theoretical formula proposed in a previous study. However, the average RTT and retransmission rate are negatively correlated with the throughput, which is similar to this formula. Furthermore, the maximum idle time, which is defined as the maximum length of the packet interarrival times, is negatively correlated with throughput. (ii) Each TCP quality metric of C/S connections is higher than that of P2P connections. Here “higher quality” means that either the throughput is higher, or the other TCP quality metrics lead to higher throughput; for example the average RTT is lower or the retransmission rate is lower. Specifically, the median throughput of C/S connections is 2.5 times higher than that of P2P connections in the incoming direction of domestic traffic. (iii) The characteristics of TCP quality metrics depend on the location of the host of the TCP connection. There are cases in which overseas servers might use a different TCP congestion control scheme. Even if we eliminate these servers, there is still a difference in the degree of impact the average RTT has on the throughput between domestic and overseas traffic. One reason for this is thought to be the difference in the maximum idle time, and another is the fact that congestion levels of these types of traffic differ, even if their average RTTs are the same.
As the number of nodes in high-performance computing (HPC) systems increases, parallel I/O becomes an important issue: collective I/O is the specialized parallel I/O that provides the function of single-file based parallel I/O. Collective I/O in most message passing interface (MPI) libraries follows a two-phase I/O scheme in which the particular processes, namely I/O aggregators, perform important roles by engaging the communications and I/O operations. This approach, however, is based on a single-core architecture. Because modern HPC systems use multi-core computational nodes, the roles of I/O aggregators need to be re-evaluated. Although there have been many previous studies that have focused on the improvement of the performance of collective I/O, it is difficult to locate a study regarding the assignment scheme for I/O aggregators that considers multi-core architectures. In this research, it was discovered that the communication costs in collective I/O differed according to the placement of the I/O aggregators, where each node had multiple I/O aggregators. The performance with the two processor affinity rules was measured and the results demonstrated that the distributed affinity rule used to locate the I/O aggregators in different sockets was appropriate for collective I/O. Because there may be some applications that cannot use the distributed affinity rule, the collective I/O scheme was modified in order to guarantee the appropriate placement of the I/O aggregators for the accumulated affinity rule. The performance of the proposed scheme was examined using two Linux cluster systems, and the results demonstrated that the performance improvements were more clearly evident when the computational node of a given cluster system had a complicated architecture. Under the accumulated affinity rule, the performance improvements between the proposed scheme and the original MPI-IO were up to approximately 26.25% for the read operation and up to approximately 31.27% for the write operation.
Jun'ichi SHIMADA Hitomi TAMURA Masato UCHIDA Yuji OIE
Congestion inherently occurs on the Internet due to traffic concentration on certain nodes or links of networks. The traffic concentration is caused by inefficient use of topological information of networks in existing routing protocols, which reduces to inefficient mapping between traffic demands and network resources. Actually, the route with minimum cost, i.e., number of hops, selected as a transmission route by existing routing protocols would pass through specific nodes with common topological characteristics that could contribute to a large improvement in minimizing the cost. However, this would result in traffic concentration on such specific nodes. Therefore, we propose a measure of the distance between two nodes that is suitable for reducing traffic concentration on specific nodes. To consider the topological characteristics of the congestion points of networks, we define node-to-node distance by using a generalized norm, p-norm, of a vector of which elements are degrees of intermediate nodes of the route. Simulation results show that both the maximum Stress Centrality (SC) and the coefficient of variation of the SC are minimized in some network topologies by selecting transmission routes based on the proposed measure of node-to-node distance.
It is important to characterize the distributional property and the long-range dependency of traffic arrival processes in modeling Internet traffic. To address this problem, we propose a long-range dependent traffic model using the unbounded Johnson distribution. Using the proposed model, a sequence of traffic rates with the desired four quantiles and Hurst parameter can be generated. Numerical studies show how well the sequence of traffic rates generated by the proposed model mimics that of the real traffic rates using a publicly available Internet traffic trace.
Myung-Ho PARK Ki-Gon NAM Jin Seok KIM Dae Hyun YUM Pil Joong LEE
A distance bounding protocol provides an upper bound on the distance between communicating parties by measuring the round-trip time between challenges and responses. It is an effective countermeasure against mafia fraud attacks (a.k.a. relay attacks). The adversary success probability of previous distance bounding protocols without a final confirmation message such as digital signature or message authentication code is at least . We propose a unilateral distance bounding protocol without a final confirmation message, which reduces the adversary success probability to .