The search functionality is under construction.

Keyword Search Result

[Keyword] network(4507hit)

161-180hit(4507hit)

  • A Rate-Based Congestion Control Method for NDN Using Sparse Explicit Rate Notification and AIMD-Based Rate Adjustment

    Takahiko KATO  Masaki BANDAI  

     
    PAPER-Network

      Pubricized:
    2022/06/09
      Vol:
    E105-B No:12
      Page(s):
    1519-1529

    In this paper, we propose a new rate-based congestion control method for Named Data Networking (NDN) using additive increase multiplicative decrease (AIMD) and explicit rate notification. In the proposed method, routers notify a corresponding consumer of bottleneck bandwidth by use of Data packets, in a relatively long interval. In addition, routers monitor outgoing faces using the leaky bucket mechanism. When congestion is detected, the routers report this to corresponding consumers using negative-acknowledgment (NACK) packets. A consumer sets its Interest sending rate to the reported rate when a new value is reported. In addition, the consumer adjusts the sending rate to be around the reported rate based on the AIMD mechanism at Data/NACK packet reception. Computer simulations show that the proposed method achieves a high throughput performance and max-min fairness thanks to the effective congestion avoidance.

  • Novel Network Structure and its Clustering Scheme Based on Residual Power for Wireless Powered Wireless Sensor Networks

    Kazuhisa HARAGUCHI  Kosuke SANADA  Hiroyuki HATANO  Kazuo MORI  

     
    PAPER-Network

      Pubricized:
    2022/05/19
      Vol:
    E105-B No:12
      Page(s):
    1498-1507

    In wireless sensor networks (WSNs), wireless power transfer (WPT) has been studied as an energy-harvesting technique for prolonging their network lifetime. The WPT can supply power resources to sensor nodes (SNs) wirelessly, however, the reception (harvesting) power at SNs depends on their distance from a WPT equipment (WPTE), leading to the location-dependent non-uniformity in the reception power among SNs. For the fixed-located WPTE, SNs distant from the WPTE suffer from insufficient reception power. To handle this problem, this paper proposes a novel network structure introducing multiple hybrid access points (HAPs), which equip two functions of conventional cluster head function, including data collection and relay transmission, and WPT function. Then, these HAPs take terms providing both functions. By periodically rotating the HAP providing the WPT function, the location of the WPTE can be changed, which reduces the non-uniformity in the SN reception power. Also, this paper proposes a clustering scheme based on the residual power at SNs to reduce their power depletion under the proposed network structure. The evaluation results through computer simulation show that the proposed system reduces the non-uniformity in the SN reception power and the power depletion at the SNs and then improves the data collection rate, compared with the conventional systems.

  • The Implementation of a Hybrid Router and Dynamic Switching Algorithm on a Multi-FPGA System

    Tomoki SHIMIZU  Kohei ITO  Kensuke IIZUKA  Kazuei HIRONAKA  Hideharu AMANO  

     
    PAPER

      Pubricized:
    2022/06/30
      Vol:
    E105-D No:12
      Page(s):
    2008-2018

    The multi-FPGA system known as, the Flow-in-Cloud (FiC) system, is composed of mid-range FPGAs that are directly interconnected by high-speed serial links. FiC is currently being developed as a server for multi-access edge computing (MEC), which is one of the core technologies of 5G. Because the applications of MEC are sometimes timing-critical, a static time division multiplexing (STDM) network has been used on FiC. However, the STDM network exhibits the disadvantage of decreasing link utilization, especially under light traffic. To solve this problem, we propose a hybrid router that combines packet switching for low-priority communication and STDM for high-priority communication. In our hybrid network, the packet switching uses slots that are unused by the STDM; therefore, best-effort communication by packet switching and QoS guarantee communication by the STDM can be used simultaneously. Furthermore, to improve each link utilization under a low network traffic load, we propose a dynamic communication switching algorithm. In our algorithm, each router monitors the network load metrics, and according to the metrics, timing-critical tasks select the STDM according to the metrics only when congestion occurs. This can achieve both QoS guarantee and efficient utilization of each link with a small resource overhead. In our evaluation, the dynamic algorithm was up to 24.6% faster on the execution time with a high network load compared to the packet switching on a real multi-FPGA system with 24 boards.

  • PDAA3C: An A3C-Based Multi-Path Data Scheduling Algorithm

    Teng LIANG  Ao ZHAN  Chengyu WU  Zhengqiang WANG  

     
    LETTER-Fundamentals of Information Systems

      Pubricized:
    2022/09/13
      Vol:
    E105-D No:12
      Page(s):
    2127-2130

    In this letter, a path dynamics assessment asynchronous advantage actor-critic scheduling algorithm (PDAA3C) is proposed to solve the MPTCP scheduling problem by using deep reinforcement learning Actor-Critic framework. The algorithm picks out the optimal transmitting path faster by multi-core asynchronous updating and also guarantee the network fairness. Compared with the existing algorithms, the proposed algorithm achieves 8.6% throughput gain over RLDS algorithm, and approaches the theoretic upper bound in the NS3 simulation.

  • GRAPHULY: GRAPH U-Nets-Based Multi-Level Graph LaYout

    Kai YAN  Tiejun ZHAO  Muyun YANG  

     
    LETTER-Computer Graphics

      Pubricized:
    2022/09/16
      Vol:
    E105-D No:12
      Page(s):
    2135-2138

    Graph layout is a critical component in graph visualization. This paper proposes GRAPHULY, a graph u-nets-based neural network, for end-to-end graph layout generation. GRAPHULY learns the multi-level graph layout process and can generate graph layouts without iterative calculation. We also propose to use Laplacian positional encoding and a multi-level loss fusion strategy to improve the layout learning. We evaluate the model with a random dataset and a graph drawing dataset and showcase the effectiveness and efficiency of GRAPHULY in graph visualization.

  • Multilayer Perceptron Training Accelerator Using Systolic Array

    Takeshi SENOO  Akira JINGUJI  Ryosuke KURAMOCHI  Hiroki NAKAHARA  

     
    PAPER

      Pubricized:
    2022/07/21
      Vol:
    E105-D No:12
      Page(s):
    2048-2056

    Multilayer perceptron (MLP) is a basic neural network model that is used in practical industrial applications, such as network intrusion detection (NID) systems. It is also used as a building block in newer models, such as gMLP. Currently, there is a demand for fast training in NID and other areas. However, in training with numerous GPUs, the problems of power consumption and long training times arise. Many of the latest deep neural network (DNN) models and MLPs are trained using a backpropagation algorithm which transmits an error gradient from the output layer to the input layer such that in the sequential computation, the next input cannot be processed until the weights of all layers are updated from the last layer. This is known as backward locking. In this study, a weight parameter update mechanism is proposed with time delays that can accommodate the weight update delay to allow simultaneous forward and backward computation. To this end, a one-dimensional systolic array structure was designed on a Xilinx U50 Alveo FPGA card in which each layer of the MLP is assigned to a processing element (PE). The time-delay backpropagation algorithm executes all layers in parallel, and transfers data between layers in a pipeline. Compared to the Intel Core i9 CPU and NVIDIA RTX 3090 GPU, it is 3 times faster than the CPU and 2.5 times faster than the GPU. The processing speed per power consumption is 11.5 times better than that of the CPU and 21.4 times better than that of the GPU. From these results, it is concluded that a training accelerator on an FPGA can achieve high speed and energy efficiency.

  • SDNRCFII: An SDN-Based Reliable Communication Framework for Industrial Internet

    Hequn LI  Die LIU  Jiaxi LU  Hai ZHAO  Jiuqiang XU  

     
    PAPER-Network

      Pubricized:
    2022/05/26
      Vol:
    E105-B No:12
      Page(s):
    1508-1518

    Industrial networks need to provide reliable communication services, usually in a redundant transmission (RT) manner. In the past few years, several device-redundancy-based, layer 2 solutions have been proposed. However, with the evolution of industrial networks to the Industrial Internet, these methods can no longer work properly in the non-redundancy, layer 3 environments. In this paper, an SDN-based reliable communication framework is proposed for the Industrial Internet. It can provide reliable communication guarantees for mission-critical applications while servicing non-critical applications in a best-effort transmission manner. Specifically, it first implements an RT-based reliable communication method using the Industrial Internet's link-redundancy feature. Next, it presents a redundant synchronization mechanism to prevent end systems from receiving duplicate data. Finally, to maximize the number of critical flows in it (an NP-hard problem), two ILP-based routing & scheduling algorithms are also put forward. These two algorithms are optimal (Scheduling with Unconstrained Routing, SUR) and suboptimal (Scheduling with Minimum length Routing, SMR). Numerous simulations are conducted to evaluate its effectiveness. The results show that it can provide reliable, duplicate-free services to end systems. Its reliable communication method performs better than the conventional best-effort transmission method in terms of packet delivery success ratio in layer 3 networks. In addition, its scheduling algorithm, SMR, performs well on the experimental topologies (with average quality of 93% when compared to SUR), and the time overhead is acceptable.

  • A Scalable Bitwise Multicast Technology in Named Data Networking

    Yuli ZHA  Pengshuai CUI  Yuxiang HU  Julong LAN  Yu WANG  

     
    PAPER-Information Network

      Pubricized:
    2022/09/20
      Vol:
    E105-D No:12
      Page(s):
    2104-2111

    Named Data Networking (NDN) uses name to indicate content mechanism to divide content, and uses content names for routing and addressing. However, the traditional network devices that support the TCP/IP protocol stack and location-centric communication mechanisms cannot support functions such as in-network storage and multicast distribution of NDN effectively. The performance of NDN routers designed for specific functional platforms is limited, and it is difficult to deploy on a large scale, so the NDN network can only be implemented by software. With the development of data plane languages such as Programmable Protocol-Independent Packet Processors (P4), the practical deployment of NDN becomes achievable. To ensure efficient data distribution in the network, this paper proposes a protocol-independent multicast method according to each binary bit. The P4 language is used to define a bit vector in the data packet intrinsic metadata field, which is used to mark the requested port. When the requested content is returned, the routing node will check which port has requested the content according to the bit vector recorded in the register, and multicast the Data packet. The experimental results show that bitwise multicast technology can eliminate the number of flow tables distributed compared with the dynamic multicast group technology, and reduce the content response delay by 57% compared to unicast transmission technology.

  • Verikube: Automatic and Efficient Verification for Container Network Policies

    Haney KANG  Seungwon SHIN  

     
    LETTER-Information Network

      Pubricized:
    2022/08/26
      Vol:
    E105-D No:12
      Page(s):
    2131-2134

    Recently, Linux Container has been the de-facto standard for a cloud system, enabling cloud providers to create a virtual environment in a much more scaled manner. However, configuring container networks remains immature and requires automatic verification for efficient cloud management. We propose Verikube, which utilizes a novel graph structure representing policies to reduce memory consumption and accelerate verification. Moreover, unlike existing works, Verikube is compatible with the complex semantics of Cilium Policy which a cloud adopts from its advantage of performance. Our evaluation results show that Verikube performs at least seven times better for memory efficiency, at least 1.5 times faster for data structure management, and 20K times better for verification.

  • Performance Analysis of Mobile Cellular Networks Accommodating Cellular-IoT Communications with Immediate Release of Radio Resources

    Shuya ABE  Go HASEGAWA  Masayuki MURATA  

     
    PAPER-Network

      Pubricized:
    2022/06/20
      Vol:
    E105-B No:12
      Page(s):
    1477-1486

    It is now becoming important for mobile cellular networks to accommodate all kinds of Internet of Things (IoT) communications. However, the contention-based random access and radio resource allocation used in traditional cellular networks, which are optimized mainly for human communications, cannot efficiently handle large-scale IoT communications. For this reason, standardization activities have emerged to serve IoT devices such as Cellular-IoT (C-IoT). However, few studies have been directed at evaluating the performance of C-IoT communications with periodic data transmissions, despite this being a common characteristic of many IoT communications. In this paper, we give the performance analysis results of mobile cellular networks supporting periodic C-IoT communications, focusing on the performance differences between LTE and Narrowband-IoT (NB-IoT) networks. To achieve this, we first construct an analysis model for end-to-end performance of both the control plane and data plane, including random access procedures, radio resource allocation, establishing bearers in the Evolved Packet Core network, and user-data transmissions. In addition, we include the impact of the immediate release of the radio resources proposed in 3GPP. Numerical evaluations show that NB-IoT can support more IoT devices than LTE, up to 8.7 times more, but imposes a significant delay in data transmissions. We also confirm that the immediate release of radio resources increases the network capacity by up to 17.7 times.

  • Boosting the Performance of Interconnection Networks by Selective Data Compression

    Naoya NIWA  Hideharu AMANO  Michihiro KOIBUCHI  

     
    PAPER

      Pubricized:
    2022/07/12
      Vol:
    E105-D No:12
      Page(s):
    2057-2065

    This study presents a selective data-compression interconnection network to boost its performance. Data compression virtually increases the effective network bandwidth. One drawback of data compression is a long latency to perform (de-)compression operation at a compute node. In terms of the communication latency, we explore the trade-off between the compression latency overhead and the reduced injection latency by shortening the packet length by compression algorithms. As a result, we present to selectively apply a compression technique to a packet. We perform a compression operation to long packets and it is also taken when network congestion is detected at a source compute node. Through a cycle-accurate network simulation, the selective compression method using the above compression algorithms improves by up to 39% the network throughput with a moderate increase in the communication latency of short packets.

  • Efficient Schedule of Path and Charge for a Mobile Charger to Improve Survivability and Throughput of Sensors with Adaptive Sensing Rates

    You-Chiun WANG  Yu-Cheng BAI  

     
    PAPER

      Pubricized:
    2022/05/27
      Vol:
    E105-B No:11
      Page(s):
    1380-1389

    Wireless sensor networks provide long-term monitoring of the environment, but sensors are powered by small batteries. Using a mobile charger (MC) to replenish energy of sensors is one promising solution to prolong their usage time. Many approaches have been developed to find the MC's moving path, and they assume that sensors have a fixed sensing rate (SR) and prefer to fully charge sensors. In practice, sensors can adaptively adjust their SRs to meet application demands or save energy. Besides, due to the fully charging policy, some sensors with low energy may take long to wait for the MC's service. Thus, the paper formulates a path and charge (P&C) problem, which asks how to dispatch the MC to visit sensors with adaptive SRs and decide their charging time, such that both survivability and throughput of sensors can be maximized. Then, we propose an efficient P&C scheduling (EPCS) algorithm, which builds the shortest path to visit each sensor. To make the MC fast move to charge the sensors near death, some sensors with enough energy are excluded from the path. Moreover, EPCS adopts a floating charging mechanism based on the ratio of workable sensors and their energy depletion. Simulation results verify that EPCS can significantly improve the survivability and throughput of sensors.

  • Loosening Bolts Detection of Bogie Box in Metro Vehicles Based on Deep Learning

    Weiwei QI  Shubin ZHENG  Liming LI  Zhenglong YANG  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2022/07/28
      Vol:
    E105-D No:11
      Page(s):
    1990-1993

    Bolts in the bogie box of metro vehicles are fasteners which are significant for bogie box structure. Effective loosening bolts detection in early stage can avoid the bolt loss and accident occurrence. Recently, detection methods based on machine vision are developed for bolt loosening. But traditional image processing and machine learning methods have high missed rate and false rate for bolts detection due to the small size and complex background. To address this problem, a loosening bolts defection method based on deep learning is proposed. The proposed method cascades two stages in a coarse-to-fine manner, including location stage based on the Single Shot Multibox Detector (SSD) and the improved SSD sequentially localizing the bogie box and bolts and a semantic segmentation stage with the U-shaped Network (U-Net) to detect the looseness of the bolts. The accuracy and effectiveness of the proposed method are verified with images captured from the Shanghai Metro Line 9. The results show that the proposed method has a higher accuracy in detecting the bolts loosening, which can guarantee the stable operation of the metro vehicles.

  • Priority Evasion Attack: An Adversarial Example That Considers the Priority of Attack on Each Classifier

    Hyun KWON  Changhyun CHO  Jun LEE  

     
    PAPER

      Pubricized:
    2022/08/23
      Vol:
    E105-D No:11
      Page(s):
    1880-1889

    Deep neural networks (DNNs) provide excellent services in machine learning tasks such as image recognition, speech recognition, pattern recognition, and intrusion detection. However, an adversarial example created by adding a little noise to the original data can result in misclassification by the DNN and the human eye cannot tell the difference from the original data. For example, if an attacker creates a modified right-turn traffic sign that is incorrectly categorized by a DNN, an autonomous vehicle with the DNN will incorrectly classify the modified right-turn traffic sign as a U-Turn sign, while a human will correctly classify that changed sign as right turn sign. Such an adversarial example is a serious threat to a DNN. Recently, an adversarial example with multiple targets was introduced that causes misclassification by multiple models within each target class using a single modified image. However, it has the weakness that as the number of target models increases, the overall attack success rate decreases. Therefore, if there are multiple models that the attacker wishes to attack, the attacker must control the attack success rate for each model by considering the attack priority for each model. In this paper, we propose a priority adversarial example that considers the attack priority for each model in cases targeting multiple models. The proposed method controls the attack success rate for each model by adjusting the weight of the attack function in the generation process while maintaining minimal distortion. We used MNIST and CIFAR10 as data sets and Tensorflow as machine learning library. Experimental results show that the proposed method can control the attack success rate for each model by considering each model's attack priority while maintaining minimal distortion (average 3.95 and 2.45 with MNIST for targeted and untargeted attacks, respectively, and average 51.95 and 44.45 with CIFAR10 for targeted and untargeted attacks, respectively).

  • Distributed Filter Using ADMM for Optimal Estimation Over Wireless Sensor Network

    Ryosuke ADACHI  Yuji WAKASA  

     
    PAPER

      Pubricized:
    2022/04/12
      Vol:
    E105-A No:11
      Page(s):
    1458-1465

    This paper addresses a distributed filter over wireless sensor networks for optimal estimation. A distributed filter over the networks allows all local estimators to calculate optimal estimates with a scalable communication cost. Outputs of the distributed filter for the optimal estimation can be denoted as a solution of a consensus optimization problem. Thus, the distributed filter is designed based on distributed alternating direction method of multipliers (ADMM). The remarkable points of the distributed filter based on the ADMM are that: the distributed filter has a faster convergence rate than distributed subgradient projection algorithm; the weight, which is optimized by a semidefinite programming problem, accelerates the convergence rate of the proposed method.

  • Opportunities, Challenges, and Solutions in the 5G Era Open Access

    Chien-Chi KAO  Hey-Chyi YOUNG  

     
    INVITED PAPER

      Pubricized:
    2022/05/27
      Vol:
    E105-B No:11
      Page(s):
    1291-1298

    For many countries in the world, 5G is of strategic significance. In the 5G era, telecom operators are expected to enable and provide multiple services with different communication characteristics like enhanced broadband, ultra-reliable and extreme real-time communications at the same time. To meet the requirements, the 5G network essentially will be more complex compared with traditional 3G/4G networks. The unique characteristics of 5G resulted from new technologies bring a lot of opportunities as well as significant challenges. In this paper we first introduce 5G vision and check the global status. And then we illustrate the 5G technical essentials and point out the new opportunities that 5G will bring to us. We also highlight the coming challenges and share our 5G experience and solutions toward 5G vision in many aspects, including network, management and business.

  • Aggregate Signature Schemes with Traceability of Devices Dynamically Generating Invalid Signatures

    Ryu ISHII  Kyosuke YAMASHITA  Yusuke SAKAI  Tadanori TERUYA  Takahiro MATSUDA  Goichiro HANAOKA  Kanta MATSUURA  Tsutomu MATSUMOTO  

     
    PAPER

      Pubricized:
    2022/08/04
      Vol:
    E105-D No:11
      Page(s):
    1845-1856

    Aggregate signature schemes enable us to aggregate multiple signatures into a single short signature. One of its typical applications is sensor networks, where a large number of users and devices measure their environments, create signatures to ensure the integrity of the measurements, and transmit their signed data. However, if an invalid signature is mixed into aggregation, the aggregate signature becomes invalid, thus if an aggregate signature is invalid, it is necessary to identify the invalid signature. Furthermore, we need to deal with a situation where an invalid sensor generates invalid signatures probabilistically. In this paper, we introduce a model of aggregate signature schemes with interactive tracing functionality that captures such a situation, and define its functional and security requirements and propose aggregate signature schemes that can identify all rogue sensors. More concretely, based on the idea of Dynamic Traitor Tracing, we can trace rogue sensors dynamically and incrementally, and eventually identify all rogue sensors of generating invalid signatures even if the rogue sensors adaptively collude. In addition, the efficiency of our proposed method is also sufficiently practical.

  • A COM Based High Speed Serial Link Optimization Using Machine Learning Open Access

    Yan WANG  Qingsheng HU  

     
    PAPER

      Pubricized:
    2022/05/09
      Vol:
    E105-C No:11
      Page(s):
    684-691

    This paper presents a channel operating margin (COM) based high-speed serial link optimization using machine learning (ML). COM that is proposed for evaluating serial link is calculated at first and during the calculation several important equalization parameters corresponding to the best configuration are extracted which can be used for the ML modeling of serial link. Then a deep neural network containing hidden layers are investigated to model a whole serial link equalization including transmitter feed forward equalizer (FFE), receiver continuous time linear equalizer (CTLE) and decision feedback equalizer (DFE). By training, validating and testing a lot of samples that meet the COM specification of 400GAUI-8 C2C, an effective ML model is generated and the maximum relative error is only 0.1 compared with computation results. At last 3 link configurations are discussed from the view of tradeoff between the link performance and cost, illustrating that our COM based ML modeling method can be applied to advanced serial link design for NRZ, PAM4 or even other higher level pulse amplitude modulation signal.

  • Reinforcement Learning for QoS-Constrained Autonomous Resource Allocation with H2H/M2M Co-Existence in Cellular Networks

    Xing WEI  Xuehua LI  Shuo CHEN  Na LI  

     
    PAPER

      Pubricized:
    2022/05/27
      Vol:
    E105-B No:11
      Page(s):
    1332-1341

    Machine-to-Machine (M2M) communication plays a pivotal role in the evolution of Internet of Things (IoT). Cellular networks are considered to be a key enabler for M2M communications, which are originally designed mainly for Human-to-Human (H2H) communications. The introduction of M2M users will cause a series of problems to traditional H2H users, i.e., interference between various traffic. Resource allocation is an effective solution to these problems. In this paper, we consider a shared resource block (RB) and power allocation in an H2H/M2M coexistence scenario, where M2M users are subdivided into delay-tolerant and delay-sensitive types. We first model the RB-power allocation problem as maximization of capacity under Quality-of-Service (QoS) constraints of different types of traffic. Then, a learning framework is introduced, wherein a complex agent is built from simpler subagents, which provides the basis for distributed deployment scheme. Further, we proposed distributed Q-learning based autonomous RB-power allocation algorithm (DQ-ARPA), which enables the machine type network gateways (MTCG) as agents to learn the wireless environment and choose the RB-power autonomously to maximize M2M pairs' capacity while ensuring the QoS requirements of critical services. Simulation results indicates that with an appropriate reward design, our proposed scheme succeeds in reducing the impact of delay-tolerant machine type users on critical services in terms of SINR thresholds and outage ratios.

  • Voronoi-Based UAV Flight Method for Non-Uniform User Distribution in Delay-Tolerant Aerial Networks

    Hiroyuki ASANO  Hiraku OKADA  Chedlia BEN NAILA  Masaaki KATAYAMA  

     
    PAPER-Network

      Pubricized:
    2022/05/11
      Vol:
    E105-B No:11
      Page(s):
    1414-1423

    This paper considers an emergency communication system controlling multiple unmanned aerial vehicles (UAVs) in the sky over a large-scale disaster-affected area. This system is based on delay-tolerant networking, and information from ground users is relayed by the UAVs through wireless transmission and the movement of UAVs in a store-and-forward manner. Each UAV moves autonomously according to a predetermined flight method, which uses the positions of other UAVs through communication. In this paper, we propose a new method for UAV flight considering the non-uniformity of user distributions. The method is based on the Voronoi cell using the predicted locations of other UAVs. We evaluate the performance of the proposed method through computer simulations with a non-uniform user distribution generated by a general cluster point process. The simulation results demonstrate the effectiveness of the proposed method.

161-180hit(4507hit)