The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SER(2307hit)

1101-1120hit(2307hit)

  • A New Fair Queueing Algorithm with Dynamic Service Probability Adjustment

    Debin YIN  Jianying XIE  Xun FAN  

     
    LETTER-Communication Theory and Signals

      Vol:
    E90-A No:11
      Page(s):
    2635-2640

    This letter proposes a new weighted fair queueing algorithm, which adjusts dynamically each flow's service probability according to its weight and average packet length and then uses the service probability parameters to implement fair queueing. This solves the main drawback of traditional weighted fair queueing algorithms--the packet-based tracing of weight parameters. In addition, this letter proposes a novel service probability calculation method which solves the unfairness problem induced by the variable packet length.

  • IP Encapsulation Mechanism for Efficient RSVP Tunnel in Next Generation Mobile Networks

    Jeong-Beom KIM  Ki-Sik KONG  Chong-Sun HWANG  

     
    PAPER

      Vol:
    E90-B No:11
      Page(s):
    3052-3060

    This paper describes IP encapsulation technologies for the Mobile RSVP tunnel in next generation networks. Bandwidth is inherently a scarce network resource, and hence signaling overhead should be minimized as much as possible. However, because of duplicate RSVP messages, the existing RSVP tunnel-based mechanism suffers from bandwidth overhead and tunnel problems. The waste of network resources prevents low-cost network construction and the maximization of integrated network utility, which are the goals of next generation networks, and can lower the reliability of networks with the increase of service subscribers and resultant expansion of resource consumption. To solve these problems and to support end-to-end QoS efficiently, RSVP needs to be changed at a minimum degree. In this paper, a new IP encapsulation mechanism for saving of network resources in the Mobile RSVP tunnel (IPEnc-RSVP) is proposed. In order to compare the proposed mechanism and the existing RSVP tunnel-based mechanism in Mobile IP-based networks, we perform a comparative analysis of bandwidth consumption gain, throughput, mean packet delay, etc., and demonstrate the superiority of the proposed mechanism. In addition, we analyze several performance factors of RSVP protocols by applying the existing RSVP tunnel-based mechanism and the proposed mechanism, respectively.

  • Enhancement of MCMV Capability for Multiuser Detection under Spreading Code Mismatch

    Ann-Chen CHANG  Jeng Han SHIU  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E90-B No:11
      Page(s):
    3303-3306

    This letter deals with multiuser detection under imprecise knowledge of the received signature codes of all active users for multicarrier code division multiple access (MC-CDMA) systems. The weight vector of the modified multiple constrained minimum variance (MMCMV) is found by projecting the multiple constrained minimum variance (MCMV) weight vector onto a vector subspace constructed from the eigenstructure of the correlation matrix. However, MMCMV still cannot handle the large code-mismatch. Shaping the noise subspace with all estimated active spreading codes, we present an effective approach to achieve more robust capabilities than the MMCMV. Computer simulations show the effectiveness of the proposed detector.

  • An On-Demand QoS Service Composition Protocol for MANETs

    Songqiao HAN  Shensheng ZHANG  Guoqi LI  Yong ZHANG  

     
    LETTER-Networks

      Vol:
    E90-D No:11
      Page(s):
    1877-1880

    This paper presents an active quality of service (QoS) aware service composition protocol for mobile ad hoc networks (MANETs), with the goal of conserving resources subject to QoS requirements. A problem of QoS based service composition in MANETs is transformed into a problem of the service path discovery. We extend Dynamic Source Routing protocol to discover and compose elementary services across the network. Some message processing measures are taken to effectively reduce control overhead. Simulation results demonstrate the effectiveness of the proposed protocol.

  • Future Direction and Roadmap of Concurrent System Technology

    Naoshi UCHIHIRA  

     
    INVITED PAPER

      Vol:
    E90-A No:11
      Page(s):
    2443-2448

    Recently, technology roadmaps have been actively constructed by various organizations such as governments, industry segments, academic societies and companies [1]. While the common basic purpose of these roadmaps is sharing common recognition of the technology among stakeholders, there exists a specific role for each organization. One of the important roles of academic societies is to show the directions in which society is moving. The IEICE technical group on Concurrent System Technology (CST) established in 1993 stands at a turning point and needs to move forward in new directions after more than a decade of activities and contributions. However, neither top-down (market-pull/requirements-pull) nor bottom-up (technology-push) roadmapping is suitable for CST because CST is a kind of systems engineering. This paper proposes a new technology roadmapping methodology (middle-up-down technology roadmapping) for systems engineering and shows three future directions of CST and one roadmap for service systems that integrate CST and services science.

  • Analysis of Second-Order Modes of Linear Discrete-Time Systems under Bounded-Real Transformations

    Shunsuke KOSHITA  Masahide ABE  Masayuki KAWAMATA  

     
    PAPER-Systems and Control

      Vol:
    E90-A No:11
      Page(s):
    2510-2515

    This paper discusses the behavior of the second-order modes (Hankel singular values) of linear discrete-time systems under bounded-real transformations, where the transformations are given by arbitrary transfer functions with magnitude bounded by unity. Our main result reveals that the values of the second-order modes are decreased under any of the above-mentioned transformations. This result is the generalization of the theory of Mullis and Roberts, who proved that the second-order modes are invariant under any allpass transformation, i.e. any lossless bounded-real transformation. We derive our main result by describing the controllability/observability Gramians of transformed systems with the help of the discrete-time bounded-real lemma.

  • Extension of Broadcasting Service by Using Electronic Tokens

    Kazuto OGAWA  Goichiro HANAOKA  Hideki IMAI  

     
    PAPER-Contents Technology and Web Information Systems

      Vol:
    E90-D No:11
      Page(s):
    1741-1750

    In the current broadcasting system or Internet content distribution system, content providers distribute decoders (STB) that contain secret keys for content decryption, prior to content distribution. A content provider sends encrypted content to each user, who then decodes it with his or her STB. While users can get the services at their houses if they have an STB, it is hard for them to get the services outside their houses. A system that allowed users to carry around their secret keys would improve usability, but it would require countermeasures against secret key exposure. In this paper, we propose such an extended broadcasting system using tokens and group signature. The content providers can control the number of keys that users can use outside their houses. The system enables the broadcasters to minimize the damage caused by group signature key exposures and the user to get services outside his or her home.

  • Coordinate Interleaved Orthogonal Design with Two Transmit Antennas in Spatially Correlated Rayleigh Fading Channels: Symbol-Error Rate and Diversity Order

    Hoojin LEE  Robert W. HEATH, Jr.  Edward J. POWERS  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E90-B No:11
      Page(s):
    3294-3297

    Full-diversity transmission for space-time block codes (STBCs) with multiple transmit antennas can be achieved by using coordinate interleaved orthogonal designs (CIODs). To effectively evaluate the performance of CIODs, we derive union upper and lower bounds on the symbol-error rate (SER) and a corresponding asymptotic diversity order of symmetric structured CIOD, in particular, with two transmit antennas over quasi-static spatially uncorrelated/correlated frequency-nonselective Rayleigh fading channels. Some numerical results are provided to verify our analysis.

  • Near Optimum Detector for DS-CDMA System Using Particle Swarm Optimization

    Muhammad A. S. CHOUDHRY  Muhammad ZUBAIR  Aqdas NAVEED  Ijaz M. QURESHI  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E90-B No:11
      Page(s):
    3278-3282

    The computational complexity of the optimum maximum likelihood detector (OMLD) does not allow its utility for multi-user detection (MUD) in code division multiple access (CDMA) systems. As proposed in this letter, particle swarm optimization (PSO) with soft decision offers a much more efficient option with few parameters to be adjusted, flexibility to implement, that gives a much faster convergence compared to OMLD. It outperforms the conventional detector, the genetic algorithm approach and the standard suboptimal detectors considered in the literature.

  • Hierarchically Distributed PCE for End-to-End Bandwidth-Assured VPN Service

    Hiroshi MATSUURA  Kazumasa TAKAMI  

     
    PAPER

      Vol:
    E90-B No:11
      Page(s):
    3042-3051

    In the Next-Generation Network (NGN), accommodating a wide variety of customer networks through virtual private network (VPN) technologies is one of the key issues. In particular, a core network provider has to provide bandwidth-assured and secured data transmission for individual private networks while performing optimal and flexible path selection. We present hierarchically distributed path computation elements (HDPCEs) that enable a virtual private network (VPN) provider to guarantee end-to-end required bandwidth and to maintain the secrecy of the link-state information of each customer from other customers. In previous studies, a VPN provider only considered link states in the provider network and did not consider customer domains connected by the provider network. HDPCEs, which are distributed to customer domains, communicate with an HDPCE for the provider network, and these HDPCEs enable the guarantee of necessary bandwidth for a data transmission from one customer domain to another via a provider network. We propose a new path-selection algorithm in each HDPCE and cooperation scheme to interwork HDPCEs, which are suitable for VPN requirements. In the evaluation, the superiority of HDPCE-based VPN path selection over legacy OSPF-TE-based VPN path selection is demonstrated in two typical VPN models: the dedicated model and shared model.

  • Performance Analysis for a System of Connection Oriented Internet Service with a Release Delay

    Shunfu JIN  Wuyi YUE  

     
    PAPER

      Vol:
    E90-B No:11
      Page(s):
    3083-3094

    In this paper, we propose the use of a discrete-time connection oriented Internet service system with a release delay for broadband, high-speed, high-capacity and high-reliability Internet requirements. The release delay called close-delay is set before the release process of a connection. An upper limit length T called timer length is set as a system parameter for the close-delay period. We build a batch arrival Geom*/G/1 queue model with a setup/close-delay/close-down strategy to characterize the system operation. By using a discrete-time imbedded Markov chain approach, we derive the stationary distribution of the system, and present the formula for Probability Generation Functions of the queue length, waiting time, busy period and busy cycle. Correspondingly, we describe the performance measures for the packet response time, setup ratio, and utility of connection. We also develop a cost model to determine the optimal timer length and its expected optimal cost. Based on numerical results, we discuss the influence of the timer length for the close-delay period on the system performance and investigate the minimum timer length and the minimum cost for different offered loads and different burst degrees, and show that the choice of the timer length is significant in improving the system performance.

  • Delay-Based Priority Control over Multi-Hop Wireless Mesh Networks

    Bing ZHANG  Oyunchimeg SHAGDAR  Suhua TANG  Youiti KADO  Masanori NOZAKI  Mehdad N. SHIRAZI  

     
    PAPER-Network

      Vol:
    E90-B No:11
      Page(s):
    3124-3132

    Wireless mesh networks are attracting more and more attention as a promising technology for the next generation access infrastructure. QoS support is a unavoidable task given the rising popularity of multimedia applications, and also a challenging task for multi-hop wireless mesh networks. Among the numerous QoS factors, end-to-end delay is one of the most critical and important issues, especially for the real time applications. Over multi-hop wireless mesh networks, end-to-end delay of a flow is highly dependant on the number of hops as well as congestion condition of the hop nodes that the flow traverses through. In this paper, we propose QoS priority control schemes based on the end-to-end QoS delay metrics in order to increase traffic accommodation, i.e., the numbers of real-time flows which satisfy the requirements of end-to-end delay and packet delivery ratio over multi-hop wireless mesh networks. The first scheme enables source and forwarding nodes to perform priority control based on the number of hops of routes. The second scheme enables nodes to perform priority control based on the congestion condition of the hop nodes, where the flow traverses through. The effectiveness of the proposed schemes is investigated with NS-2 network simulator for voice and video traffics over multi-hop wireless mesh networks. Simulation results show that the scheme greatly improves the traffic accommodation for voice and video applications in multi-hop wireless mesh networks.

  • A Hierarchical Service Management System for MPLS Network Services

    Kenji KUMAKI  Ikuo NAKAGAWA  Kenichi NAGAMI  Tomohiko OGISHI  Shigehiro ANO  

     
    PAPER

      Vol:
    E90-B No:10
      Page(s):
    2764-2771

    This paper proposes a hierarchical service management system for MPLS network services. Traditionally, general management systems which have been deployed in some service providers control MPLS LSPs (e.g. RSVP-TE, LDP) and services (e.g. L2VPN, L3VPN and IP) separately. If a fault occurs in an MPLS network, the dedicated management system for MPLS LSPs can detect the fault and recognize the state of MPLS LSPs. However, it cannot detect the extent of the impact due to the fault in each service. Furthermore, its own inability to identify the affected customer means it takes some time to identify the affected customers, cooperating manually with the dedicated management system for services. Therefore, this paper proposes a new automatic correlation between MPLS LSPs and each service. In particular, this paper proposes a new algorithm for a correlation between RSVP-TE LSPs and L3VPN services. Simulations are conducted to evaluate the capacity on a correlation table and the performance searching on a correlation table, and results show this system is very scalable within real MPLS production networks. This system, with the automatic correlation, could be sufficiently deployed in real MPLS production networks.

  • Identification of Attack Nodes from Traffic Matrix Estimation

    Yuichi OHSITA  Shingo ATA  Masayuki MURATA  

     
    PAPER-Internet

      Vol:
    E90-B No:10
      Page(s):
    2854-2864

    Distributed denial-of-service attacks on public servers have recently become more serious. The most effective way to prevent this type of traffic is to identify the attack nodes and detach (or block) attack nodes at their egress routers. However, existing traceback mechanisms are currently not widely used for several reasons, such as the necessity of replacement of many routers to support traceback capability, or difficulties in distinguishing between attacks and legitimate traffic. In this paper, we propose a new scheme that enables a traceback from a victim to the attack nodes. More specifically, we identify the egress routers that attack nodes are connecting to by estimating the traffic matrix between arbitral source-destination edge pairs. By monitoring the traffic variations obtained by the traffic matrix, we identify the edge routers that are forwarding the attack traffic, which have a sharp traffic increase to the victim. We also evaluate the effectiveness of our proposed scheme through simulation, and show that our method can identify attack sources accurately.

  • A Next-Generation Enterprise Server System with Advanced Cache Coherence Chips

    Mariko SAKAMOTO  Akira KATSUNO  Go SUGIZAKI  Toshio YOSHIDA  Aiichiro INOUE  Koji INOUE  Kazuaki MURAKAMI  

     
    PAPER-VLSI Architecture for Communication/Server Systems

      Vol:
    E90-C No:10
      Page(s):
    1972-1982

    Broadcast and synchronization techniques are used for cache coherence control in conventional larger scale snoop-based SMP systems. The penalty for synchronization is directly proportional to system size. Meanwhile, advances in LSI technology now enable placing a memory controller on a CPU die. The latency to access directly linked memory is drastically reduced by an on-die controller. Developing an enterprise server system with these CPUs allows us an opportunity to achieve higher performance. Though the penalty of synchronization is counted whenever a cache miss occurs, it is necessary to improve the coherence method to receive the full benefit of this effect. In this paper, we demonstrate a coherence directory organization that fits into DSM enterprise server systems. Originally, a directory-based method was adopted in high performance computing systems because of its huge scalability in comparison with snoop-based method. Though directory capacity miss and long directory access latency are the major problems of this method, the relaxed scalability requirement of enterprise servers is advantageous to us to solve these problems along with an advanced LSI technology. Our proposed directory solves both problems by implementing a full bit vector level map of the coherence directory on an LSI chip. Our experimental results validate that a system controlled by our proposed directory can surpass a snoop-based system in performance even without applying data localization optimization to an online transaction processing (OLTP) workload.

  • TR-UWB Systems with Pulse-Position Multi-Pulse Modulation for ECC's and Japan's Radiation Masks

    Jakkrapong SUMETHNAPIS  Kiyomichi ARAKI  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E90-B No:10
      Page(s):
    2969-2972

    This letter proposes the Pulse-position Multi-pulse Modulation (PMM) with multiple access DTR-UWB systems for the ECC's proposed radiation mask on September 2005 and Japan's radiation mask on March 2006. For the ECC's proposed radiation mask and Japan's radiation mask, the UWB system has to consider the effect from Remote Access Service (RAS) and Radar system between 4.8-5 GHz and 5-6 GHz, respectively. That will limit the bandwidth of the system to just 3.4-4.8 GHz. The simulation results show that the performance of the proposed system is superior to that of the conventional TR-UWB communication system. Moreover, compared to the FCC's system, the proposed PMM DTR-UWB and conventional system have better error performance and higher total throughput at low Eb/N0. So for power limiting system like UWB, ECC's and Japan's systems may become the strong candidates in the UWB communication system.

  • A Compensatory Packet Dropping Routine for Proportional Loss Rate Differentiation

    Hyoup-Sang YOON  Bong-Jin YUM  

     
    PAPER-Internet

      Vol:
    E90-B No:10
      Page(s):
    2865-2873

    Service differentiation is one of the key issues in the current Internet. In this paper, we focus on a recent proposal for proportional loss rate differentiation which employs a single FIFO queue, an AQM algorithm for computing the packet drop probability, and a counter-based packet dropping routine for achieving the intended proportional loss rate differentiation among classes. It is first shown that, when the target dropping probability of a class is large, the counter-based packet dropping routine may yield a significant amount of error between the target and measured drop probabilities for the class, and subsequently, fails to maintain the loss rate ratios between classes as intended. To avoid this problem, a new compensatory packet dropping routine is developed in this paper. Then, a series of simulation experiments are conducted using the ns-2 simulator to assess the performances of the two dropping routines under various congestion conditions and quality spacings between classes. The simulation results show that, unlike the counter-based dropping routine, the proposed compensatory dropping routine is effective in keeping the loss rate ratios between classes closely on target regardless of the degree of congestion and quality spacing between classes, while the two dropping routines perform similarly in terms of throughput and queueing delay in the bottleneck link. In addition, such robustness of the proposed routine is achieved without any additional control parameter or computational effort compared to the counter-based routine.

  • State-Space Analysis of Power Complementary Filters

    Shunsuke KOSHITA  Masahide ABE  Masayuki KAWAMATA  

     
    PAPER-Analog Signal Processing

      Vol:
    E90-A No:10
      Page(s):
    2265-2271

    This paper presents a new analysis of power complementary filters using the state-space representation. Our analysis is based on the bounded-real Riccati equations that were developed in the field of control theory. Through this new state-space analysis of power complementary filters, we prove that the sum of the controllability/observability Gramians of a pair of power complementary filters is represented by a constant matrix, which is given as a solution to the bounded-real Riccati equations. This result shows that power complementary filters possess complementary properties with respect to the Gramians, as well as the magnitude responses of systems. Furthermore, we derive new theorems on a specific family of power complementary filters that are generated by a pair of invertible solutions to the bounded-real Riccati equations. These theorems show some interesting relationships of this family with respect to the Gramians, zeros, and coefficients of systems. Finally, we give a numerical example to demonstrate our results.

  • Autonomous Correlated Services Access for High Response in Multi-Agent Systems

    Xiaodong LU  Kinji MORI  

     
    PAPER

      Vol:
    E90-B No:10
      Page(s):
    2712-2719

    To meet users' multi-service requests under dynamic and heterogenous environment with high-assurance, the Autonomous Network-Based Integration System based on Faded Information Field (FIF) has been proposed, which permits to actively integrate the correlated information services according to the current situation of the system. However, the increase in the total number of users' requests and changes in users' preferences cause the unbalancing load in the system and the overload in the locality. In this paper, based on the autonomous access distribution in the locality, a new approach of autonomous correlated services access is proposed to reduce the load of the system and achieve the adaptability and timeliness of correlated services utilization. We proved the effectiveness of the proposed technology through the simulation and the results show that the system can improve the average response time not only for joint requests of correlated services, but also for separate requests of each service under changing environments.

  • Optical Beat Noise Reduction Using FM to AM Conversion of Injection-Locked FP-Laser Diode in Reflective SOA Based WDM/SCM-Passive Optical Networks

    Yong-Yuk WON  Hyuk-Choon KWON  Sang-Kook HAN  

     
    LETTER-Fiber-Optic Transmission for Communications

      Vol:
    E90-B No:10
      Page(s):
    2953-2956

    A new scheme for reducing optical beat interference noise in a reflective semiconductor optical amplifier based wavelength division multiplexed/subcarrier multiplexing -- passive optical network is proposed. This method uses an Fabry Perot laser locked by modulated lights from optical network units in a central office. As an experimental verification, it is reported that carrier to noise ratio is enhanced by 10 dB and power penalty is improved by 16 dB.

1101-1120hit(2307hit)