Masanori TAKAOKA Masato UCHIDA Kei OHNISHI Yuji OIE
In this paper, we propose a file replication method to achieve load balancing in terms of write access to storage device ("write storage access load balancing" for short) in unstructured peer-to-peer (P2P) file-sharing networks in which the popularity trend of queried files varies dynamically. The proposed method uses a write storage access ratio as a load balance index value in order to stabilize dynamic P2P file-sharing environments adaptively. In the proposed method, each peer autonomously controls the file replication ratio, which is defined as a probability to create the replica of the file in order to uniform write storage access loads in the similar way to thermal diffusion phenomena. Theoretical analysis results show that the behavior of the proposed method actually has an analogy to a thermal diffusion equation. In addition, simulation results reveal that the proposed method has an ability to realize write storage access load balancing in the dynamic P2P file-sharing environments.
Logan VOLKERS Neil BARAKAT Thomas DARCIE
DOCSIS is the defacto industry standard for cable internet to the home. In this letter, we examine the delay characteristics of commercially deployed DOCSIS networks. We focus on four mechanisms of the DOCSIS MAC operation and develop a computationally simple simulator to reproduce the phenomena produced by these mechanisms. In reproducing these phenomena using our simulator, we demonstrate that the simulator properly encapsulates the core mechanisms of DOCSIS and effectively simulates the delay of packets.
Chao HUANG Jianling SUN Xinyu WANG Di WU
In this paper, we propose an inconsistency resolution method based on a new concept, insecure backtracking role mapping. By analyzing the role graph, we prove that the root cause of security inconsistency in distributed interoperation is the existence of insecure backtracking role mapping. We propose a novel and efficient algorithm to detect the inconsistency via finding all of the insecure backtracking role mappings. Our detection algorithm will not only report the existence of inconsistency, but also generate the inconsistency information for the resolution. We reduce the inconsistency resolution problem to the known Minimum-Cut problem, and based on the results generated by our detection algorithm we propose an inconsistency resolution algorithm which could guarantee the security of distributed interoperation. We demonstrate the effectiveness of our approach through simulated tests and a case study.
Masashi KAMIYANAGI Fumitaka IGA Shoji IKEDA Katsuya MIURA Jun HAYAKAWA Haruhiro HASEGAWA Takahiro HANYU Hideo OHNO Tetsuo ENDOH
In this paper, it is shown that our fabricated MTJ of 60180 nm2, which is connected to the MOSFET in series by 3 levels via and 3 levels metal line, can dynamically operate with the programming current driven by 0.14 µm CMOSFET. In our measurement of transient characteristic of fabricated MTJ, the pulse current, which is generated by the MOSFET with an applied pulse voltage of 1.5 V to its gate, injected to the fabricated MTJ connected to the MOSFET in series. By using the current measurement technique flowing in MTJ with sampling period of 10 nsec, for the first time, we succeeded in monitor that the transition speed of the resistance change of 60180 nm2 MTJ is less than 30 ns with its programming current of 500 µA and the resistance change of 1.2 kΩ.
Xuan ZHANG Qiaoyan WEN Jie ZHANG
In this paper, we propose four new general constructions of LCZ/ZCZ sequence sets based on interleaving technique and affine transformations. A larger family of LCZ/ZCZ sequence sets with longer period are generated by these constructions, which are more flexible among the selection of the alphabet size, the period of the sequences and the length of LCZ/ZCZ, compared with those generated by the known constructions. Especially, two families of the newly constructed sequences can achieve or almost achieve the theoretic bound.
With simultaneous multi-user transmissions, spatial division multiple access (SDMA) provides substantial throughput gain over the single user transmission. However, its implementation in WLANs with contention-based IEEE 802.11 MAC remains challenging. Problems such as coordinating and synchronizing the multiple users need to be solved in a distributed way. In this paper, we propose a distributed MAC protocol for WLANs with SDMA support. A dual-mode CTS responding mechanism is designed to accomplish the channel estimation and user synchronization required for SDMA. We analytically study the throughput performance of the proposed MAC, and dynamic parameter adjustment is designed to enhance the protocol efficiency. In addition, the proposed MAC protocol does not rely on specific physical layer realizations, and can work on legacy IEEE 802.11 equipment with slight software updates. Simulation results show that the proposed MAC outperforms IEEE 802.11 significantly, and that the dynamic parameter adjustment can effectively track the load variation in the network.
Junko SHIROGANE Takashi MORI Hajime IWATA Yoshiaki FUKAZAWA
Computers and software have become necessities in human society, and most people are required to be able to use them. However, software is not always accessible for users with special needs, and it is difficult to develop software accessible to such users. There are many guidelines and support tools for developing accessible websites. For software, however, such guidelines and support tools are few. In our research, to develop accessible software easily we propose a method of evaluating the accessibility of Graphical User Interface (GUI) software. This method involves analyzing GUI software source programs, assessing accessibility on the basis of accessibility guidelines, and presenting a list of unsatisfactory accessibility code and indicating how to modify it.
Myoungrak LEE Byungsik YOON Hyogon KIM Hoh Peter IN
Lawful Interception (LI) refers to a lawfully authorized process of looking into private communication under a court-issued warrant. Quite a number of countries have been drafting and enacting laws authorizing the LI procedures on packet-switched IP networks including traditional circuit-switched ones. As the IP mobility becomes more ubiquitous, propelled by wireless networks, it becomes an issue in the LI domain to keep track of a migrating target. However, with the world's focus on the current LI architectures, little consideration has been given to a seamless LI triggering, which accommodates IP mobility and vertical handover. Proposed herein are a seamless LI architecture and relevant triggering algorithms for the heterogeneous wireless networks. The simulation results demonstrate that the proposed architecture secures a seamless LI by capturing all the suspected target traffics without any time delay, which usually occurs during an LI triggering between different service providers. Furthermore, when compared with the existing LI architectures, the architecture significantly helps reduce transmission and the time consumed for analysis of the content of communication (CC) and intercept related information (IRI).
Ruixuan LI Jianfeng LU Zhengding LU Xiaopu MA
The safety and availability policies are very important in an access control system for ensuring security and success when performing a certain task. However, conflicts may arise between safety and availability policies due to their opposite focuses. In this paper, we address the problem of consistency checking for safety and availability policies, especially for the co-existence of static separation-of-duty (SSoD) policies with availability policies, which determines whether there exists an access control state that satisfies all of these policies. We present criteria for determining consistency with a number of special cases, and show that the general case and partial subcases of the problem are intractable (NP-hard) and in the Polynomial Hierarchy NPNP. We design an algorithm to efficiently solve the nontrivial size instances for the intractable cases of the problem. The running example shows the validity of the proposed algorithm. The investigation will help the security officer to specify reasonable access control policies when both safety and availability policies coexist.
Performance of band-limited baseband synchronous CDMA using orthogonal Independent Component Analysis (ICA) spreading sequences is investigated. The orthogonal ICA sequences have an orthogonality condition in a synchronous CDMA like the Walsh-Hadamard sequences. Furthermore, these have useful correlation properties like the Gold sequences. These sequences are obtained easily by using the ICA which is one of the brain-style signal processing algorithms. In this study, the ICA is used not as a separator for received signal but as a generator of spreading sequences. The performance of the band-limited synchronous CDMA using the orthogonal ICA sequences is compared with the one using the Walsh-Hadamard sequences. For limiting bandwidth, a Root Raised Cosine filter (RRC) is used. We investigate means and variances of correlation outputs after passing the RRC filter and the Bit Error Rates (BERs) of the system in additive white Gaussian noise channel by numerical simulations. It is found that the BER in the band-limited system using the orthogonal ICA sequences is much lower than the one using the Walsh-Hadamard sequences statistically.
Frank EFFENBERGER Jun-ichi KANI
This paper reviews the standardization work that has been done in question 2 of ITU-T study group 15, which is the lead group on optical access transport technology. The major topics covered are the progress in the G-PON series and the new point-to-point fiber access recommendation. Finally, a brief view of the future plan of XG-PON is presented.
Hideaki KIMURA Noriko IIYAMA Yoshihito SAKAI Kiyomi KUMOZAKI
We propose the network on demand concept to yield the optical access network system that well handles the diversity in user demands and support technologies such as module and devices configuration. In this proposal, the network accommodation equipment, such as OLT needed for each service, is installed ‘virtually' using WDM, and the physical rate can adapt to the user-demanded service rate by using the WDM parallel transmission technique. It well handles the diversity in user demands/services and lowers system power consumption.
Koji WAKAYAMA Michitaka OKUNO Jun SUGAWA Daisuke MASHIMO Hiroki IKEDA Kenichi SAKAMOTO
We propose an optical switch control procedure for the Active Optical Access System (AOAS). Optical switches are used in AOAS instead of optical splitters in PON. In the proposed procedure, an OLT determines the switching schedules of optical switches on OSW (Optical Switching Unit) which is installed between OLT and ONU, and informs the OSW of them with a switch control frame preceding of data frame transmission. Then the switch controller on OSW controls the optical switches based on the switching schedules. We developed the prototype systems of OSW, OLT, and ONU. We implemented the optical switch control function with logic circuits on the prototype systems. We demonstrate the proposed procedure works effectively with logic circuits. We also evaluate the 10 Gps optical signal transmission between OLT and ONU. We demonstrate the receiver sensibility on OLT and ONU achieves the distance of 40 km for optical signals transmission with FEC (Forward Error Correction). These receivers are applicable for both AOAS and 10G-EPON.
We present our proposed designs of optical access architecture based on WDM technology toward new-generation networks for two types of topologies: Single-star (SS) and passive-double-star (PDS). We adopt the concept of WDM-direct which links multiple wavelengths to each optical network unit (ONU). Our proposed architecture based on WDM-direct can achieve more than 10 Gbps access per ONU. Moreover, our architecture can provide not only conventional bandwidth-shared services but also bandwidth-guaranteed services requiring more than 10 Gbps bandwidth by establishing end-to-end lightpaths directly to each ONU, and thus meet high requirements of QoS in new-generation networks. Firstly, we show our proposed designs of SS-type architecture, and experimentally demonstrate the system. We confirm that the optical line terminal (OLT) successfully switches between packet/lightpath data transmissions for each ONU. In addition, we measure and evaluate optical power loss in upstream/downstream transmissions between the OLT and ONUs. Secondly, we show our proposed designs of PDS-type architecture, and theoretically analyze and evaluate the bit-rate capacity of the system.
Ngoc T. DANG Anh T. PHAM Zixue CHENG
We analyze the beat noise cancellation in two-dimensional optical code-division multiple-access (2-D OCDMA) systems using an optical hard-limiter (OHL) array. The Gaussian shape of optical pulse is assumed and the impact of pulse propagation is considered. We also take into account the receiver noise and multiple access interference (MAI) in the analysis. The numerical results show that, when OHL array is employed, the system performance is greatly improved compared with the cases without OHL array. Also, parameters needed for practical system design are comprehensively analyzed.
Takeshi KITAHARA Hiroki FURUYA Hajime NAKAMURA
Since traffic in IP access networks is less aggregated than in backbone networks, its variance could be significant and its distribution may be long-tailed rather than Gaussian in nature. Such characteristics make it difficult to forecast traffic volume in IP access networks for appropriate capacity planning. This paper proposes a traffic forecasting method that includes a function to control residual error distribution in IP access networks. The objective of the proposed method is to grasp the statistical characteristics of peak traffic variations, while conventional methods focus on average rather than peak values. In the proposed method, a neural network model is built recursively while weighting residual errors around the peaks. This enables network operators to control the trade-off between underestimation and overestimation errors according to their planning policy. Evaluation with a total of 136 daily traffic volume data sequences measured in actual IP access networks demonstrates the performance of the proposed method.
Hiroyuki KAWAI Akihito MORIMOTO Kenichi HIGUCHI Mamoru SAWAHASHI
This paper investigates the gain of inter-Node B macro diversity for a scheduled-based shared channel using single-carrier FDMA radio access in the Evolved UTRA (UMTS Terrestrial Radio Access) uplink based on system-level simulations. More specifically, we clarify the gain of inter-Node B soft handover (SHO) with selection combining at the radio frame length level (=10 msec) compared to that for hard handover (HHO) for a scheduled-based shared data channel, considering the gains of key packet-specific techniques including channel-dependent scheduling, adaptive modulation and coding (AMC), hybrid automatic repeat request (ARQ) with packet combining, and slow transmission power control (TPC). Simulation results show that the inter-Node B SHO increases the user throughput at the cell edge by approximately 10% for a short cell radius such as 100-300 m due to the diversity gain from a sudden change in other-cell interference, which is a feature specific to full scheduled-based packet access. However, it is also shown that the gain of inter-Node B SHO compared to that for HHO is small in a macrocell environment when the cell radius is longer than approximately 500 m due to the gains from hybrid ARQ with packet combining, slow TPC, and proportional fairness based channel-dependent scheduling.
Peng WANG Xiaofeng ZHONG Limin XIAO Shidong ZHOU Jing WANG Yong BAI
In this letter, the performance improvement by the deployment of multiple antennas in cognitive radio systems is studied from a system-level view. The term opportunistic spectrum efficiency (OSE) is defined as the performance metric to evaluate the spectrum opportunities that can actually be exploited by the secondary user (SU). By applying a simple energy combining detector, we show that deploying multiple antennas at the SU transceiver can improve the maximum achievable OSE significantly. Numerical results also reveal that the improvement comes from the reduction of both the detection overhead and the false alarm probability.
Abdorasoul GHASEMI S. Mohammad RAZAVIZADEH
A simple distributed Medium Access Control (MAC) protocol for cognitive wireless networks is proposed. It is assumed that the network is slotted, the spectrum is divided into a number of channels, and the primary network statistical aggregate traffic model on each channel is given by independent Bernoulli random variables. The objective of the cognitive MAC is to maximize the exploitation of the channels idle time slots. The cognitive users can achieve this aim by appropriate hopping between the channels at each decision stage. The proposed protocol is based on the rule of least failures that is deployed by each user independently. Using this rule, at each decision stage, a channel with the least number of recorded collisions with the primary and other cognitive users is selected for exploitation. The performance of the proposed protocol for multiple cognitive users is investigated analytically and verified by simulation. It is shown that as the number of users increases the user decision under this protocol comes close to the optimum decision to maximize its own utilization. In addition, to improve opportunity utilization in the case of a large number of cognitive users, an extension to the proposed MAC protocol is presented and evaluated by simulation.
UHF band passive RFID systems are being steadily adopted by industries because of their capability of long range automatic identification with passive tags. For an application which demands a large number of readers located in a limited geographical area, referred to as dense reader mode, interference rejection among readers is important. The coding method, baseband or subcarrier coding, in the tag-to-reader communication link results in a significant influence on the interference rejection performance. This paper examines the frequency sharing of baseband and subcarrier coding UHF RFID systems from the perspective of their transmission delay using a media access control (MAC) simulator. The validity of the numerical simulation was verified by an experiment. It is revealed that, in a mixed operation of baseband and subcarrier systems, assigning as many channels as possible to baseband system unless they do not exploit the subcarrier channels is the general principle for efficient frequency sharing. This frequency sharing principle is effective both to baseband and subcarrier coding systems. Otherwise, mixed operation fundamentally increases the transmission delay in subcarrier coding systems.