The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] UPC(20hit)

1-20hit
  • Effectiveness of a Hybrid Method of Block Ack and Unsolicited Retry on Binary Data Lossless Groupcast over Wireless LANs

    Toshiro NUNOME  Akira NAGAHARA  

     
    PAPER-Network

      Pubricized:
    2022/07/01
      Vol:
    E106-B No:1
      Page(s):
    35-43

    In this paper, we propose a combined method of GCR Block Ack and Unsolicited Retry for binary data lossless groupcast over wireless LANs. The two mechanisms are standardized as IEEE 802.11aa GCR for audiovisual transmission. In the proposed method, the sender transmits each frame twice without acknowledgment as Unsolicited Retry under lossy wireless link conditions. After transmitting twice, the sender enters the Block Ack sequence. In addition, we apply TXOP-Bursting, which allows a terminal to send frames sequentially with high priority during the TXOP limit, to the combined method. To show the proposal's effectiveness, we carry out a computer simulation. We assume binary data transmission of about 40MB and assess the time of complete reception at all the receivers. From the result, we find that the proposed method can shorten the received time against the conventional Block Ack method.

  • Photon Upconversion Dyes System with Red to Yellow Wavelength Conversion Function

    Hirokazu YAMANE  Mayo KAWAHARA  Genta TAKATOKI  Masataka TAGUCHI  Yasuhiro YAMASAKI  Toshihiko NAGAMURA  

     
    PAPER

      Vol:
    E102-C No:2
      Page(s):
    107-112

    Photon upconversion (UC) is a technique to convert long wavelength light into short wavelength light. UC fluorescence by triplet-triplet annihilation (TTA) follows a mechanism involving two kinds of molecules as sensitizer and emitter. In this study, we constructed the photon UC dyes system that was applicable to weak excitation light and convert the red light into yellow light in high efficiency. The present result will be useful for the purpose of application to optical elements and light medical care.

  • QoE Enhancement of Audio-Video Reliable Groupcast with IEEE 802.11aa

    Toshiro NUNOME  Takuya KOMATSU  

     
    PAPER

      Pubricized:
    2018/01/22
      Vol:
    E101-B No:7
      Page(s):
    1645-1652

    This paper enhances the QoE of audio and video multicast transmission over a wireless LAN by means of reliable groupcast schemes. We use GCR (GroupCast with Retries) Unsolicited Retry and GCR Block ACK as reliable groupcast schemes; they are standardized by IEEE 802.11aa. We assume that a wireless access point transmits audio and video streams to several terminals connected to the access point by groupcast. We compare three schemes: Groupcast with EDCA (Enhanced Distributed Channel Access), GCR Unsolicited Retry and GCR Block ACK. We perform computer simulations under various network conditions to assess application-level QoS and evaluate QoE by a subjective experiment. As a result, we find that the most effective scheme depends on network conditions.

  • Toward Small Size Waveguide Amplifiers Based on Erbium Silicate for Silicon Photonics

    Hideo ISSHIKI  Tadamasa KIMURA  

     
    INVITED PAPER

      Vol:
    E91-C No:2
      Page(s):
    138-144

    Integration of light sources on a Si chip is one of milestone to establish new paradigm of LSI systems, so-called "silicon photonics." In recent years remarkable progress has been made in the Si wire waveguide technologies for optical interconnection on a Si chip. In this paper, several Er embedded materials based on silicon are surveyed from the standpoint of application to the light emission and amplification devices for silicon photonics. We have concentrated to investigate an erbium silicate (Er2SiO5) as a light source medium for silicon photonics. To mention the particular features, this material has a layered structure with 0.86-nm period and a large amount of Er (25at%) as its constituent. The single crystalline nature gives several remarkable properties for the application to silicon photonics. We also discuss our recent studies of Er2SiO5 and a possibility of the shorter waveguide amplifier.

  • Simultaneous Frequency Conversion Technique Utilizing an SOA-MZI for Full-Duplex WDM Radio over Fiber Applications

    Jong-In SONG  Ho-Jin SONG  

     
    INVITED PAPER

      Vol:
    E90-C No:2
      Page(s):
    351-358

    Simultaneous all-optical frequency up/downconversion technique utilizing a single semiconductor optical amplifier Mach-Zehnder interferometer (SOA-MZI) for full-duplex WDM radio over fiber (RoF) applications is presented. Using this technique, error-free simultaneous upconversion and downconversion of RoF signals with a finite-length single mode fiber were experimentally demonstrated. The results show the potential of the proposed scheme for use in a cost-effective full-duplex WDM RoF link.

  • Full-Duplex Transmission Using 2-RF-Port Electroabsorption Transceiver with Photonic Up- and Downconversions for Millimeter-Wave Radio-on-Fiber System

    Kensuke IKEDA  Toshiaki KURI  Yoshiro TAKAHASHI  Ken-ichi KITAYAMA  

     
    PAPER-Photonic Links for Wireless Communications

      Vol:
    E86-C No:7
      Page(s):
    1138-1145

    Full-duplex transmission of 60.0 GHz and 59.6 GHz millimeter-wave (mm-wave) signals of 155.52-Mbit/s differential phase shift keying (DPSK) data, radio-on-fiber (ROF) signals over 25-km-long standard single-mode fibers (SMFs) is experimentally demonstrated for the first time using a single 2-RF-port electroabsorption transceiver (EAT). The simplification of base stations (BSs) is strongly required to realize cost-effective and high-reliability mm-wave wireless access. This single EAT detects a C-band ROF signal modulated by a mm-wave downlink signal and simultaneously modulates the L-band optical carrier by a mm-wave uplink signal. The BS mainly consists of the EAT, leading to a simple and low-cost BS. Optical pilot tones and optical bandpass filters are used for photonic downconversion and photonic upconversion, to convert frequencies between mm-wave signals and intermediate frequency (IF) signals in the optical domain. With the use of optical conversions, these signals have no significant fading problems. The simultaneous transmission of both up- and downlinks has been achieved with the BER of less than 10-9. Also the fading problems due to the fiber dispersion of photonic conversions are analyzed mathematically in this paper. The single-EAT BS will become a promising candidate for a ROF access system.

  • An Efficient Standard-Compatible Traffic Description Parameter Selection Algorithm for VBR Video Sources

    Heejune AHN  Andrea BAIOCCHI  Jae-kyoon KIM  

     
    LETTER-Fundamental Theories

      Vol:
    E84-B No:12
      Page(s):
    3274-3277

    The international telecommunication standards bodies such as ITU-T, ATM Forum, and IETF recommend the dual leaky bucket for the traffic specifications for VBR service. On the other hand, recent studies have demonstrated multiple time-scale burstiness in compressed video traffic. In order to fill this gap between the current standards and real traffic characteristics, we present a standard-compatible traffic parameter selection method based on the notion of a critical time scale (CTS). The defined algorithm is optimal in the sense that it minimizes the required amount of link capacity for a traffic flow under a maximum delay constraint. Simulation results with compressed video traces demonstrate the efficiency of the defined traffic parameter selection algorithm in resource allocation.

  • Usage Parameter Control Scheme for ATM Networks: Markovian State-Dependent Approach

    Piya TANTHAWICHIAN  Akihiro FUJII  Yoshiaki NEMOTO  

     
    PAPER-Communication Device and Circuit

      Vol:
    E80-B No:12
      Page(s):
    1780-1789

    For traffic control in high speed ATM Networks Usage Parameter Control (UPC) plays an important role. The existing UPC schemes have some limitations. It is difficult to implement policy which involves monitoring vioations while guaranteeing QoS for the compliant connections-particularly with respect to bursty traffic sources. This is due to the difficulty in measuring the Sustained Cell Rate (SCR) and Maximum Burst Size (MBS) parameters simultaneously. To ensure prompt action against policy-violations, speedy detection is an important requirement. But the existing UPC schemes do not have a satisfactory response time. In this paper, we propose a new scheme called Markovian State-Dependent UPC schemes (MSDU) to police SCR and MBS parameter violation simultaneously with a satisfactory response time. The MSDU scheme is performed by using two virtual queues: 1) a Markovian State Dependent Service queue and 2) a Fixed Service queue. The discrete time analysis of the MSDU is carried out for a bursty source which is a Markov-Modulated Bernoulli Process (MMBP). The improved effectiveness of the proposed MSDU is clarified by a numerical comparison with UPC based on standard Leaky Bucket scheme.

  • Worst Case Analysis for Multiplexed Traffic Enforced by Enhanced Leaky Bucket with CDV Tolerance

    Jung-Shyr WU  Shyh-Wen SUE  

     
    PAPER-Communication Networks and Services

      Vol:
    E80-B No:4
      Page(s):
    557-563

    In ATM networks, a usage parameter control (UPC) strategy must regulate incoming traffic according to the characteristics of the sources declared at call set-up. Among various UPC schemes, Leaky Bucket is a conventionally method having been discussed extensively. This paper examines the characteristics of the multiplexer with a sufficient buffer in which cell arrivals are policed by Enhanced Leaky-Bucket (ELB) before entering the system. In addition to the factor of mean rate, peak rate and cell delay variation (CDV) are also considered for each ELB. We find out the worst output pattern from the ELB and derive the upper bound on average waiting time as a function of the ELB parameters.

  • Connection Admission Control Guaranteeing Negotiated Cell-Loss Ratio of Cell Streams Passing through Usage Parameter Control

    Shigeo SHIODA  Hiroshi SAITO  

     
    PAPER-Communication Networks and Services

      Vol:
    E80-B No:3
      Page(s):
    399-411

    A connection admission control (CAC) that guarantees a negotiated cell-loss ratio for all cell-streams passing through the usage parameter control (UPC) in ATM networks is proposed. In particular, the cases in which a jumping-window, sliding-window, or continuous-leaky-bucket scheme are used for peak-cell-rate policing are discussued, and the upper bound for cell-loss ratio of the cell-streams passing through each type of UPC is derived. The CACs based on the derived cell-loss-ratio upper bounds ensure the quality of service in all cases by combining the relevant UPCs. There are three possible combinations of CAC and UPC, depending on the UPC mechanism used. The impact of the choice of CAC and UPC combination on bandwidth utilization is discussed using several numerical examples.

  • Delay Bound Analysis for Multiplexed Traffic Controlled by Enhanced Leaky Bucket

    Jung-Shyr WU  Fang-Jang KUO  Shyh-Wen SUE  

     
    PAPER-Communication Networks and Services

      Vol:
    E79-B No:11
      Page(s):
    1615-1622

    In ATM networks, two main functions for achieving traffic control and congestion control are Call Admission Control (CAC) and Usage Parameter Control (UPC). Among various UPC schemes, Leaky Bucket is a popular one. In this paper, we study the characteristics of the system in which every traffic source is regulated by an enhanced leaky-bucket before entering the multiplexer at the edge node of the ATM network. In addition to the factor of mean cell rate, peak cell rate is also taken into consideration. Based on the criteria of average waiting time at the multiplexer, we derive the performance bounds expressed as the functions of the LB parameters and numbers of connections.

  • Usage Parameter Control in ATM Networks by Solving CDV Problem at UNI

    Fang-Jang KUO  Jung-Shyr WU  

     
    PAPER-Communication Networks and Services

      Vol:
    E79-B No:7
      Page(s):
    946-952

    Due to the Cell Delay Variation (CDV) at User Network Interface (UNI), it is very hard for an ATM network to perform Usage Parameter Control (UPC), which is an important job for congestion control. Based on the Generic Cell Rate Algorithm (GCRA), ATM Forum has proposed a procedure to perform the UPC. However, the severe problem is that a user has to specify the CDV Tolerance at the UNI by itself. Such a nearly unreachable constraint makes the GCRA unsuitable for UPC. In this paper, we point out that the CDV comprises two parts in which the customer and a network provider should be responsible. Thus, we propose a concept of Innocent Public Network and an Agent Protocol to realize the principle and facilitate UPC. In addition, a shaper is suggested for the customer to employ so as to prevent its performance degradation. In the proposed system, the network is no longer suffered from CDV at the UNI and the UPC can be easily preformed.

  • Performance Evaluation of an ATM Connection with Several Cell Flow Components

    Naoaki YAMANAKA  Francis PITCHO  Hiroaki SATO  

     
    LETTER-Communication Networks and Services

      Vol:
    E79-B No:5
      Page(s):
    716-718

    This letter studies the Peak Cell Rate (PCR) policing of ATM connections that consist of multiple cell flow components. It is shown that the conventional methods proposed for policing the aggregate flow do not use the network's resources efficiently. This letter proposes a simple and efficient UPC (Usage Parameter Control) mechanism based on a tandem leaky bucket for multi-component ATM connections. The results show that network resource requirements can be minimized, with reasonable hardware complexity.

  • Congestion Control for ABR Service Based on Dynamic UPC/NPC

    Katsumi YAMATO  Hiroshi ESAKI  

     
    PAPER-Communication Networks and Services

      Vol:
    E79-B No:2
      Page(s):
    142-152

    A novel reactive congestion control scheme based on Dynamic UPC/NPC (Usage/Network Parameter Control) in ATM networks is proposed. In this scheme, policing parameters at the UPC/NPC are dynamically modified in response to the reception of RM (Resource Management) cells. In a congested state, traffic volume submitted to the network is regulated by Dynamic UPC/NPC, while providing negotiated QoS (Quality of Service) for each ATM connection. When end-stations (or edge-entities between network segments) operate according to ER-based (Explicit Rate based) behavior, a UPC/NPC function will indicate (send) an ER value toward each source end-station using backward RM cells. In this case, the policing parameter at the UPC/NPC should take the same value as the ER value. When end-stations (or edge-entities) operate according to EFCI-based (Explicit Forward Congestion Indication based) behavior, the modified policing parameter at the UPC/NPC point must be harmonized with the modified cell transmission rate at the source end-stations (or at the edge-entities). In order to improve the control performance for the long distance connections, backward RM cells will be generated by the NPC function (UPC function will be optional) at the egress of a congested network in response to the reception of EFCI marked cells (or forward RM cells) as a proxy destination end-station, and they will be sent back toward the UPC/NPC function at the ingress of the network. As a result, the proposed control scheme enables the network to recover from the congested state securely and provide the negotiated service quality, even if cooperation of (rate-based) flow control at each source end-station (and at edge-entities between network segments) is not expected.

  • Jitter Tolerant Usage Parameter Control Method for ATM-based B-ISDN

    Naoaki YAMANAKA  Toyofumi TAKENAKA  Youichi SATO  Ken-ichi SATO  

     
    PAPER

      Vol:
    E78-B No:4
      Page(s):
    485-493

    A uniquely-structured Usage Parameter Control (UPC) method named Virtual-shaping is proposed which considers cell arrival time jitter between user and UPC point. The method uses a modified Dangerous Bridge UPC circuit (Sliding window type) and virtually (logically) shapes cell traffic using cell arrival time compensation to offset cell delay variation (CDV). In addition, the proposed method is based on a cell-buffer-less structure and can be realized with reasonable hardware. The method yields precise and accurate monitoring. Computer simulations show that the method offers higher network utilization than the conventional Leaky Bucket based UPC method. The proposed method will make it possible to create more effective B-ISDNs, and more cost-effective broadband VBR services.

  • Policing and Spacing of Multiplexed ATM Traffic

    Hong-Shik PARK  Jae-Kyoon KIM  

     
    PAPER-Communication Networks and Service

      Vol:
    E77-B No:9
      Page(s):
    1122-1132

    In this paper we propose an effective Peak Rate Spacer (PRS) which can guarantee the negotiated peak cell rate almost perfectly even though contention of cells in the output link of the spacer occurs. We also propose a state-dependent Mean cell Rate Policer-Spacer (MRPS) which can manage the cell loss rate properly by controlling the buffer read rate according to the buffer state. As the MRPS has a cell buffer, it intrinsically has a traffic shaping function. Simulation results clearly show effectiveness of our PRS and MRPS.

  • Evaluation of Policing Mechanisms for ATM Networks

    Kiyoshi SHIMOKOSHI  

     
    PAPER-Switching and Communication Processing

      Vol:
    E76-B No:11
      Page(s):
    1341-1351

    To realize Broadband ISDN, which provides multi-media services, ATM (Asynchronous Transfer Mode) has been standardized by CCITT and the development of the system is accelerating towards the 21st century. The packet-oriented information transfer based on fixed size blocks called cells provides a very flexible allocation of transmission capacity to different connections. On the other hand, to ensure the QoS (Quality of Service) for all established connections it is necessary to monitor and regulate the input traffic from each user based on usage parameters which are negotiated between user and network at connection set-up, i.e., a policing function is required. In this paper some requirements for a policing function will be given. Accuracy of the policing decision for violating and well-behaving sources, tolerance with respect to cell delay variation (CDV) which is caused by multiplexing functions between the source terminal and the policing device, time to detect arriving violating cells, implementation complexity, and amount, i.e., cost effectiveness, are discussed mainly. We present simulation results for five policing mechanisms, Leaky Bucket (LB), Jumping Window (JW), and Moving Window (MW) which have been already well-known, Pseudo Jumping Window (PJW), and Pseudo Moving Window (PMW) which are proposed mechanisms. PJM and PMW mechanisms required a pseudo cell buffer with finite queueing capacity to the corresponding JW and MW mechanisms, respectively. These two mechanisms can be expected as advanced methods from view points of the accuracy of the policing for long-term fluctuated compliant source, fast reaction ability and restrictness to long burst traffic comparing with the above existing methods. We compare the five mechanisms based on the above requirements and show that the PJW and the LB are the most effective mechanisms for mean rate policing in ATM networks.

  • Usage Parameter Control and Bandwidth Allocation Methods Considering Cell Delay Variation in ATM Networks

    Naoaki YAMANAKA  Youichi SATO  Ken-ichi SATO  

     
    PAPER

      Vol:
    E76-B No:3
      Page(s):
    270-279

    This paper proposes an ATM traffic management method that utilizes a deterministic source traffic descriptor, a deterministic Usage Parameter Control (UPC) algorithm and a conservative statistical bandwidth allocation method all of which were developed considering the Cell Delay Variation (CDV) typically experienced in ATM networks. For the source traffic descriptor, sliding time interval-type descriptors are proposed. A newly-structured UPC method which combines a sliding window-type circuit and a 2-phase credit window type circuit is proposed. The method is precise and accurate and requires only a small amount of hardware. The proposed parameter conversion method considers the CDV generated between User and UPC point. A bandwidth allocation method based on the worst clumping pattern and UPC output pattern is proposed. The network efficiency degradation caused by CDV is calculated. This traffic management method not only guarantees the QOS of all connections but also allows for large statistical multiplexing gains. The proposed method will, therefore, make it possible to create a more effective B-ISDN, one that can offer cost-effective broadband VBR services.

  • Precise UPC Scheme Suitable for ATM Networks Characterized by Widely Ranging Traffic Parameter Values

    Naoaki YAMANAKA  Youichi SATO  Ken-ichi SATO  

     
    LETTER-Communication Networks and Service

      Vol:
    E75-B No:12
      Page(s):
    1367-1372

    This letter proposes a new UPC (Usage Parameter Control) method suitable for monitoring/controlling the ATM cell streams of VCs (Virtual Channels) and VPs (Virtual Paths) specified with a wide-range of traffic parameter values. The method, named the 2-phase T-X method, combines two credit window type monitoring circuits that are shifted in phase by T/2. The proposed method achieves the best of both the DB and T-X methods. Its cell mis-policing rate is very low (equivalent to that of the DB-method) while its minimal hardware requirements are equal to those of the T-X method. The proposed method ensures more effective network resource (link) utilization. As a result, the proposed method is shown to be a credible UPC technique for handling broadband VBR (Variable Bit Rate) traffic in ATM based multimedia networks.

  • Performance Limitation of Leaky Bucket Algorithm for Usage Parameter Control and Bandwidth Allocation Methods

    Naoaki YAMANAKA  Youichi SATO  Ken-ichi SATO  

     
    LETTER-Communication Networks and Service

      Vol:
    E75-B No:2
      Page(s):
    82-86

    One performance limitation of the "Leaky Bucket algorithm" for usage parameter control and traffic management in Asynchronous Transfer Mode (ATM) networks is analyzed. Simulation results show that the conventional statistical bandwidth allocation method, which uses the most bursty pattern permitted by the Leaky Bucket algorithm, can not guarantee the QOS of established Virtual Channels/Paths (VC/VP). As a result, the VC/VP bandwidth allocation method based on the Leaky Bucket algorithm is proven to be unsatisfactory.