IEICE Transactions on Communications
Online ISSN : 1745-1345
Print ISSN : 0916-8516
E92.B 巻, 4 号
選択された号の論文の53件中1~50を表示しています
Special Section on Internet Technology and its Architecture for Ambient Information Systems
  • Motonori NAKAMURA
    2009 年 E92.B 巻 4 号 p. 1069
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
  • Masayuki MURATA
    原稿種別: INVITED PAPER
    2009 年 E92.B 巻 4 号 p. 1070-1076
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル フリー
    In this article, we introduce a new concept for the future information environment, called an “ambient information environment (AmIE).” We first explain it, especially emphasizing the difference from the existing ubiquitous information environment (UbIE), which is an interaction between users and environments. Then, we focus on an ambient networking environment (AmNE) which supports the AmIE as a networking infrastructure. Our approach of a biologically inspired framework is next described in order to demonstrate why such an approach is necessary in the AmIE. Finally, we show some example for building the AmNE.
  • Kenichi ISHIBASHI, Naoto MORISHIMA, Masayuki KANBARA, Hideki SUNAHARA, ...
    原稿種別: INVITED PAPER
    2009 年 E92.B 巻 4 号 p. 1077-1085
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル フリー
    Interaction between emergency medical technicians (EMTs) and doctors is essential in emergency medical care. Doctors require diverse information related to a patient to provide efficient aid. In 2005, we started the Ikoma119 project and have developed a ubiquitous communication platform for emergency medical care called Mobile ER. Our platform, which is based on wireless internet technology, has such desirable properties as low-cost, location-independent service, and ease of service introduction. We provide an overview of our platform and describe the services that we have developed. We also discuss the remaining issues to realize our platform's actual operation.
  • Bumjoo PARK, Kiejin PARK, Bongjun KIM
    原稿種別: PAPER
    2009 年 E92.B 巻 4 号 p. 1086-1093
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    In this study, a performance isolation mechanism based on a fuzzy control technique is developed in such a way that ambiguous situations caused when estimating the workload of cluster-based web servers, client request rates, and dynamic request rates can be represented effectively. The proposed mechanism involving a fuzzy-based technique is compared with a non-fuzzy technique in terms of the response time in the 95th percentile. Experiments showed that the proposed technique improves the performance of web servers that provide differentiated services.
  • Kenji KUMAKI, Ikuo NAKAGAWA, Kenichi NAGAMI, Tomohiko OGISHI, Shigehir ...
    原稿種別: PAPER
    2009 年 E92.B 巻 4 号 p. 1094-1103
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    This paper proposes a point-to-multipoint (P2MP) Multi-Protocol Label Switching (MPLS) based hierarchical service management system. Traditionally, general management systems deployed in some service providers control MPLS Label Switched Paths (LSPs) (e.g., RSVP-TE and LDP) and services (e.g., L2VPN, L3VPN and IP) separately. In order for dedicated management systems for MPLS LSPs and services to cooperate with each other automatically, a hierarchical service management system has been proposed with the main focus on point-to-point (P2P) TE LSPs in MPLS path management. In the case where P2MP TE LSPs and services are deployed in MPLS networks, the dedicated management systems for P2MP TE LSPs and services must work together automatically. Therefore, this paper proposes a new algorithm that uses a correlation between P2MP TE LSPs and multicast VPN services based on a P2MP MPLS-based hierarchical service management architecture. Also, the capacity and performance of the proposed algorithm are evaluated by simulations, which are actually based on certain real MPLS production networks, and are compared to that of the algorithm for P2P TE LSPs. Results show this system is very scalable within real MPLS production networks. This system, with the automatic correlation, appears to be deployable in real MPLS production networks.
  • Tomoyuki IIJIMA, Hiroyasu KIMURA, Makoto KITANI, Yoshifumi ATARASHI
    原稿種別: PAPER
    2009 年 E92.B 巻 4 号 p. 1104-1111
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    To develop a network management system (NMS) more easily, the authors developed an application programming interface (API) for configuring network devices. Because this API is used in a Java development environment, an NMS can be developed by utilizing the API and other commonly available Java libraries. It is thus possible to easily develop an NMS that is highly compatible with other IT systems. And operations that are generated from the API and that are exchanged between the NMS and network devices are based on NETCONF, which is standardized by the Internet Engineering Task Force (IETF) as a next-generation network-configuration protocol. Adopting a standardized technology ensures that the NMS developed by using the API can manage network devices provided from multi-vendors in a unified manner. Furthermore, the configuration items exchanged over NETCONF are specified in an object-oriented design. They are therefore easier to manage than such items in the Management Information Base (MIB), which is defined as data to be managed by the Simple Network Management Protocol (SNMP). We actually developed several NMSs by using the API. Evaluation of these NMSs showed that, in terms of configuration time and development time, the NMS developed by using the API performed as well as NMSs developed by using a command line interface (CLI) and SNMP. The NMS developed by using the API showed feasibility to achieve “autonomic network management” and “high interoperability with IT systems.”
  • Shinsaku KIYOMOTO, Kazuhide FUKUSHIMA, Toshiaki TANAKA
    原稿種別: PAPER
    2009 年 E92.B 巻 4 号 p. 1112-1118
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    Privacy remains an issue for IT services. Users are concerned that their history of service use may be traceable since each user is assigned a single identifier as a means of authentication.
    In this paper, we propose a perfectly anonymous attribute authentication scheme that is both unidentifiable and untraceable. Then, we present the evaluation results of a prototype system using a PC and mobile phone with the scheme. The proposed scheme employs a self-blindable certificate that a user can change randomly; thus the certificate is modified for each authentication, and the authentication scheme is unidentifiable and untraceable. Furthermore, our scheme can revoke self-blindable certificates without leaks of confidential private information and check the revocation status without online access.
  • Dengfeng ZHANG, Naoshi NAKAYA, Yuuji KOUI, Hitoaki YOSHIDA
    原稿種別: PAPER
    2009 年 E92.B 巻 4 号 p. 1119-1127
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    Recently, the appearance frequency of computer virus variants has increased. Updates to virus information using the normal pattern matching method are increasingly unable to keep up with the speed at which viruses occur, since it takes time to extract the characteristic patterns for each virus. Therefore, a rapid, automatic virus detection algorithm using static code analysis is necessary. However, recent computer viruses are almost always compressed and obfuscated. It is difficult to determine the characteristics of the binary code from the obfuscated computer viruses. Therefore, this paper proposes a method that unpacks compressed computer viruses automatically independent of the compression format. The proposed method unpacks the common compression formats accurately 80% of the time, while unknown compression formats can also be unpacked. The proposed method is effective against unknown viruses by combining it with the existing known virus detection system like Paul Graham's Bayesian Virus Filter etc.
  • Yohei HASEGAWA, Masahiro JIBIKI
    原稿種別: PAPER
    2009 年 E92.B 巻 4 号 p. 1128-1136
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル フリー
    Topology information has become more important for management of LANs due to the increasing number of hosts attached to a LAN. We describe three Ethernet topology discovery techniques that can be used even in LANs with Ethernet switches that have no management functionality. Our “Shared Switch Detection (SSD)” technique detects the Ethernet tree topology by testing whether two paths in the network share a switch. SSD uses only general MAC address learning. By borrowing MAC addresses from hosts, SSD can be run from a single host. The second technique determines whether two paths between two pairs of hosts contain a switch. The third reduces the number of shared switch detections. Simulation showed that these techniques can be used to detect the Ethernet topology with a reasonable search cost. Examination on a real-world testbed showed that they could detect an Ethernet topology consisting of six hosts and two switches within one second.
  • Ki-Hyeon KIM, Won-Kee HONG, Hie-Cheol KIM
    原稿種別: PAPER
    2009 年 E92.B 巻 4 号 p. 1137-1143
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    A time synchronization protocol for WSN is required to compensate time discrepancy. Time discrepancy among sensor nodes inevitably happens in WSN due to several internal and external factors. In order to make WSN's own job done effectively, a time synchronization protocol should be designed to achieve low execution time and low network traffic as well as accurate synchronization. Several synchronization protocols have been proposed to provide accurate time synchronization but do not consider execution time and network traffic for time synchronization. This paper proposes MNTP; it provides rapid and accurate time synchronization in multi-hop communication range. It presents a new broadcast scheme and time stamping mechanism to achieve low execution time and low network traffic along with accurate synchronization. Evaluation results show that MNTP improves synchronization accuracy up to 22% in single-hop and 51% in multi-hop respectively. MNTP also has 67 times and 58 times lower execution time and network traffic when 300 nodes are deployed in 20 × 20m2 sensor field.
  • Yasufumi MORIOKA, Takeshi HIGASHINO, Katsutoshi TSUKAMOTO, Shozo KOMAK ...
    原稿種別: PAPER
    2009 年 E92.B 巻 4 号 p. 1144-1152
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    This paper proposes a VoIP (Voice over Internet Protocol) session capacity expansion method that uses periodic packet transmission suppression control for wireless LANs. The proposed method expands the VoIP session capacity of an AP without critically degrading the QoS (Quality of Service) of all stations. Simulation results show the proposed method with 0.5% packet suppression control on each station expands a VoIP session capacity by up to 5% compared to a legacy method while satisfying required QoS for all stations.
  • Shoichiro ASANO, Susumu YONEDA
    原稿種別: LETTER
    2009 年 E92.B 巻 4 号 p. 1153-1155
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    Climate change and/or pandemics are global life threatening concerns. For verifying and utilizing monitored data for solving to the Climate Change concerns, a network system based on device ID would be proposed. In this paper, we review the recent standardization initiatives in ITU-T, and propose an ID network that can be used to verify the solutions.
Regular Section
  • Mariusz GLABOWSKI, Maciej STASIAK, Arkadiusz WISNIEWSKI, Piotr ZWIERZY ...
    原稿種別: PAPER
    専門分野: Fundamental Theories for Communications
    2009 年 E92.B 巻 4 号 p. 1156-1165
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    This article proposes a method that can calculate the blocking probability of multi-service cellular systems with Wideband Code Division Multiple Access radio interface. The method considers a finite and an infinite source population and takes into account the interdependency of calls service processes in neighboring cells and in both the uplink and the downlink directions. The basis of the proposed method is the fixed-point methodology. A comparison of the results of analytical calculations to those of simulations confirms the accuracy of the proposed method. The proposed scheme can realize cost-effective radio resource management in 3G mobile networks and can be easily applied to network capacity calculations.
  • Bokrae JUNG, Min-Gon KIM, Byong-Whi KIM, Minho KANG
    原稿種別: PAPER
    専門分野: Fiber-Optic Transmission for Communications
    2009 年 E92.B 巻 4 号 p. 1166-1172
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    Although wavelength division multiplexing-passive optical network (WDM-PON) is known as a high-speed transfer, it creates high channel costs per subscriber and low bandwidth utilization due to the fact that a wavelength is dedicated to each subscriber. Thus, it is imperative to reduce channel costs per subscriber and improve the bandwidth utilization. To achieve these, we first adopt a existing WDM-PON, which uses the bidirectional transmission with a single source for cost-efficiency by employing a gain-saturated reflective semiconductor optical amplifier (RSOA). Secondly, based on the existing WDM-PON, we propose an enhanced hybrid WDM/TDM-PON, which can extend the number of subscribers supported in each wavelength with splitters in the physical layer and a shared-time division duplex (TDD) frame format in the media access control (MAC) layer. Moreover, it can adaptively control the bandwidth through a dynamic bandwidth allocation (DBA) scheme according to the volume of traffic. Compared to the non TDD-based hybrid WDM/TDM-PON, it can reduce channel costs per subscriber from the extended number of subscribers supported in each wavelength. Furthermore, due to the DBA, it can improve the total queueing delay and throughput, and thus increase the bandwidth utilization.
  • Yusuke FUKUSHIMA, Xiaohong JIANG, Achille PATTAVINA, Susumu HORIGUCHI
    原稿種別: PAPER
    専門分野: Switching for Communications
    2009 年 E92.B 巻 4 号 p. 1173-1182
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    Arrayed waveguide grating (AWG) is a promising technology for constructing high-speed large-capacity WDM switches, because it can switch fast, is scalable to large size and consumes little power. To take the full advantage of high-speed AWG, the routing control of a massive AWG-based switch should be as simple as possible. In this paper, we focus on the self-routing design of AWG-based switches with O(1) constant routing complexity and propose a novel construction of self-routing AWG switches that can guarantee the attractive nonblocking property for both the wavelength-to-wavelength and wavelength-to-fiber request models. We also fully analyze the proposed design in terms of its blocking property, hardware cost and crosstalk performance and compare it against traditional designs. It is expected that the proposed construction will be useful for the design and all-optical implementation of future ultra high-speed optical packet/burst switches.
  • Xiaoliang WANG, Xiaohong JIANG, Susumu HORIGUCHI
    原稿種別: PAPER
    専門分野: Switching for Communications
    2009 年 E92.B 巻 4 号 p. 1183-1190
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    We focus on non-conflicting construction of an optical multistage feedforward network to emulate the N-to-1 output buffer multiplexer by using switched fiber delay line (SDL). In [1], Y.T. Chen et al. presented a sufficient condition (an upper bound) for the number of delay lines required for such a multiplexer with variable length bursts. In this paper, we first give an improved upper bound. Then we develop a framework to construct an arrival case of bursts which can be used to achieve a necessary condition (a lower bound). These results are further extended to the feedforward construction of N-to-N output buffer switch. Through simulation and performance comparison, we find that the new bounds can significantly decrease the hardware cost for constructing both the feedforward SDL-based multiplexer and output buffer switch while still provide the same performance as that of the old ones.
  • Kwan-Woong KIM, Dae-Ik KIM
    原稿種別: PAPER
    専門分野: Network
    2009 年 E92.B 巻 4 号 p. 1191-1198
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    In a multi-hop mobile ad-hoc network, broadcasting is an elementary operation to support many applications. Broadcasting by flooding may cause serious redundancy, contention, and collision in the network, which is referred to as the broadcast storm problem. Many broadcasting schemes have been proposed to give better performance than simple flooding in mobile ad-hoc network. How to decide whether rebroadcast or not also poses a dilemma between reachability and efficiency under different host densities. In this paper, we propose an enhanced broadcasting scheme, which can reduce rebroadcast packets without loss of reachability. Simulation results show that the proposed scheme offers better reachability and efficiency than other previous schemes.
  • Trong Duc LE, Hyunseung CHOO
    原稿種別: PAPER
    専門分野: Network
    2009 年 E92.B 巻 4 号 p. 1199-1209
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    Flooding is an indispensable operation for providing control or routing functionalities to mobile ad hoc networks (MANETs). Previously, many flooding schemes have been studied with the intention of curtailing the problems of severe redundancies, contention, and collisions in traditional implementations. A recent approach with relatively high efficiency is 1HI by Liu et al., which uses only 1-hop neighbor information. The scheme achieves local optimality in terms of the number of retransmission nodes with time complexity &Theta(n log n), where n is the number of neighbors of a node; however, this method tends to make many redundant transmissions. In this paper, we present a novel flooding algorithm, 2HBI (2-hop backward information), that efficiently reduces the number of retransmission nodes and solves the broadcast storm problem in ad hoc networks using our proposed concept, “2-hop backward information.” The most significant feature of the proposed algorithm is that it does not require any extra communication overhead other than the exchange of 1-hop HELLO messages but maintains high deliverability. Comprehensive computer simulations show that the proposed scheme significantly reduces redundant transmissions in 1HI and in pure flooding, up to 38% and 91%, respectively; accordingly it alleviates contention and collisions in networks.
  • Lee SPEAKMAN, Yasunori OWADA, Kenichi MASE
    原稿種別: PAPER
    専門分野: Network
    2009 年 E92.B 巻 4 号 p. 1210-1221
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    Transient routing loops have been observed to form in Mobile Ad-hoc Networks running the OLSRv2 proactive link-state routing protocol. The packets falling into loops impact the surrounding network thus degrading throughput even though only a small proportion of the traffic may enter these loops and only for a short time. This becomes significantly more evident when Link Layer Notification is used to catch broken links, inadvertently leading to an increase in the number of loops. Two methods of Loop Detection are introduced and are used to trigger either Loop Suppression by selectively and preemptively discarding the looping packets that are unlikely to reach their destination, or Loop Correction by the notification of the routing protocol to cut the link over which the packet is looping. The newly introduced Loop Suppression and Loop Correction techniques used with Link Layer Notification are shown to significantly increase network performance over plain OLSRv2 and OLSRv2 with Link Layer Notification.
  • Go HASEGAWA, Yuichiro HIRAOKA, Masayuki MURATA
    原稿種別: PAPER
    専門分野: Network
    2009 年 E92.B 巻 4 号 p. 1222-1232
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    Recent research on overlay networks has revealed that user-perceived network performance, such as end-to-end delay performance, could be improved by an overlay routing mechanism. However, these studies consider only end-to-end delay, and few studies have focused on bandwidth-related information, such as available bandwidth and TCP throughput, which are important performance metrics especially for long-lived data transmission. In the present paper, we investigate the effect of overlay routing both delay and bandwidth-related information, based on the measurement results of network paths between PlanetLab nodes. We consider three metrics for selecting the overlay route: end-to-end delay, available bandwidth, and TCP throughput. We then show that the available bandwidth-based overlay routing provides significant gain, as compared with delay-based routing. We further reveal the correlation between the latency and available bandwidth of the overlay paths and propose several guidelines for selecting an overlay path.
  • Yasuhiro SATO, Shingo ATA, Ikuo OKA, Chikato FUJIWARA
    原稿種別: PAPER
    専門分野: Network
    2009 年 E92.B 巻 4 号 p. 1233-1243
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    The end-to-end round trip time (RTT) is one of the most important communication characteristics for Internet applications. From the viewpoint of network operators, RTT may also become one of the important metrics to understand the network conditions. Given this background, we should know how a factor such as a network incident influences RTTs. It is obvious that two or more factors may interfere in the observed delay characteristics, because packet transmission delays in the Internet are strongly dependent on the time-variant condition of the network. In this paper, we propose a modeling method by using mixed distribution which enables us to express delay characteristic more accurately where two or more factors exist together. And, we also propose an inferring method of network behavior by decomposition of the mixed distribution based on modeling results. Furthermore, in experiments we investigate the influence caused by each network impact factor independently. Our proposed method can presume the events that occur in a network from the measurements of RTTs by using the decomposition of the mixed distribution.
  • Peng XUE, Ning CAO, Dong Kwan KANG, Duk Kyung KIM
    原稿種別: PAPER
    専門分野: Wireless Communication Technologies
    2009 年 E92.B 巻 4 号 p. 1244-1251
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    In this paper, a multi-cell joint channel estimation (JCE) method is proposed for the TD-SCDMA downlink. In the proposed multi-cell JCE approach, the received midambles from adjacent cells are jointly processed, rather than being treated as interference as in single cell channel estimation. By jointly processing all the received midambles, the user can simultaneously estimate the channel impulse responses (CIRs) for both its home cell and adjacent cells. If the received signal from adjacent cells has a delay, multi-cell JCE is still operable with slight adjustment in the midamble matrix, and the performance loss is also minor. The performance of multi-cell JCE is analyzed and evaluated by simulations. The results demonstrate that the proposed multi-cell JCE method can significantly improve the channel estimation accuracy. When the signal from each cell has similar power level, the mean square error (MSE) of the estimated CIRs for all cells is lower than 0.01. With more accurate CIRs from multi-cell JCE, multi-cell JD also yields better performance compared with the single cell channel estimation methods.
  • Jongin KIM, Dongwoo KIM, Sehun KIM
    原稿種別: PAPER
    専門分野: Wireless Communication Technologies
    2009 年 E92.B 巻 4 号 p. 1252-1257
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    The capacity of multiuser OFDM systems can be maximized by allocating resources (subcarrier and power) to the user with the highest instantaneous channel gain. This assumes complete channel state information (CSI) at the transmitter, which is achieved by every user reporting its CSI for all subcarriers to the transmitter via feedback channel. In practice, due to the limited capacity of the feedback channel, the completeness of CSI may be severely restricted especially with a large number of users transmitting a large amount of feedback information. In order to reduce the amount of feedback information while preserving the maximal capacity, quality based CSI feedback (QCF) is proposed in this letter. The system capacity is derived with QCF and compared with that of full CSI feedback. The results show that QCF successfully reduces the amount of feedback information with little capacity loss.
  • Kenichi HIGUCHI, Hiroyuki KAWAI, Hidekazu TAOKA, Noriyuki MAEDA, Mamor ...
    原稿種別: PAPER
    専門分野: Wireless Communication Technologies
    2009 年 E92.B 巻 4 号 p. 1258-1271
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    This paper proposes an adaptive selection algorithm for the surviving symbol replica candidates (ASESS) based on the maximum reliability in maximum likelihood detection with QR decomposition and the M-algorithm (QRM-MLD) for Orthogonal Frequency Division Multiplexing (OFDM) multiple-input multiple-output (MIMO) multiplexing. In the proposed algorithm, symbol replica candidates newly-added at each stage are ranked for each surviving symbol replica from the previous stage using multiple quadrant detection. Then, branch metrics are calculated only for the minimum number of symbol replica candidates with a high level of reliability using an iterative loop based on symbol ranking results. Computer simulation results show that the computational complexity of the QRM-MLD employing the proposed ASESS algorithm is reduced to approximately 1/4 and 1/1200 compared to that of the original QRM-MLD and that of the conventional MLD with squared Euclidian distance calculations for all symbol replica candidates, respectively, assuming the identical achievable average packet error rate (PER) performance in 4-by-4 MIMO multiplexing with 16QAM data modulation. The results also show that 1-Gbps throughput is achieved at the average received signal energy per bit-to-noise power spectrum density ratio (Eb/N0) per receiver antenna of approximately 9dB using the ASESS algorithm in QRM-MLD associated with 16QAM modulation and Turbo coding with the coding rate of 8/9 assuming a 100-MHz bandwidth for a 12-path Rayleigh fading channel (root mean square (r.m.s.) delay spread of 0.26µs and maximum Doppler frequency of 20Hz).
  • Yoshinori TANAKA, Iwao SASASE
    原稿種別: PAPER
    専門分野: Wireless Communication Technologies
    2009 年 E92.B 巻 4 号 p. 1272-1281
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    The performance of a UHF-band passive RFID system in a dense multi-reader environment is limited by both the reader-to-reader interference and reader-to-tag interference. In this paper, first, we propose a combination of subcarrier modulation backscattering and reduced carrier frequency offset among readers to reduce both the reader-to-reader interference and the reader-to-tag interference. Then, we propose a new distributed modulation index control scheme using the readers' estimation of the tag's SINR in order to further reduce the reader-to-tag interference. By adaptively controlling each reader's transmission modulation index, the asymmetric reader-to-tag interference can be effectively controlled to satisfy the required SINR of tags. Computer simulations show that the proposed scheme can reduce the minimum required inter-reader distance or increase the number of concurrently operable readers in dense multi-reader environments, especially when there are large differences in the levels of reader-to-tag interference. We show some optimizations of the proposed scheme for practical RFID applications. We also propose a bandwidth efficient modulation scheme for reader transmission which is suitable for the proposed modulation index control scheme.
  • Hyun-Ki KIM, Chang-Yeong OH, Tae-Jin LEE
    原稿種別: PAPER
    専門分野: Terrestrial Radio Communications
    2009 年 E92.B 巻 4 号 p. 1282-1290
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    Equipping wireless routers with multiple radios further improves the capacity by transmitting over multiple radios simultaneously using orthogonal channels. Efficient channel assignment schemes can greatly alleviate the interference effect of nearby transmissions. One of the distinctive features in wireless multi-hop networks is the lack of any central controller, in which each node makes its own decisions. Therefore, fully cooperative behaviors, such as cooperation for increasing link capacity, alleviating interferences for one another, might not be directly applied. In this paper, we aim to present some applications to show how such a framework can be invoked to design efficient channel assignment algorithms in a non-cooperative, topology-blind environment as well as in environments where the competing players share perfect information about channel usage and topology environment and so on. Simulation results are presented to illustrate the effectiveness of the algorithms.
  • Youngjip KIM, Chong-Ho CHOI
    原稿種別: PAPER
    専門分野: Terrestrial Radio Communications
    2009 年 E92.B 巻 4 号 p. 1291-1299
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    The binary exponential back-off mechanism is one of the basic elements that constitute the IEEE 802.11 protocol. The models of the back-off mechanism have been developed with the assumption that collisions occur only due to nodes within the carrier sensing range and the collision probability is constant in steady-state. However, the transmission collisions can occur due to hidden nodes and these tend to occur consecutively, contrary to the collisions due to nodes within the carrier sensing range. Consecutive collisions increase the back-off time exponentially, resulting in less frequent transmission attempts. Ignoring this collision characteristic in modeling the back-off mechanism can produce large errors in the performance analysis of networks. In this paper, we model the back-off process as a Markov renewal process by taking into account such consecutive collisions due to hidden nodes, and then compare this result with NS2 simulation results. According to the simulation results, the proposed model reduces the relative error in the attempt probability by more than 90% in the grid topology. We also propose a new collision model for a simple network considering consecutive collisions due to hidden nodes, and analyze the network under saturated traffic condition using the proposed models. The attempt and collision probabilities are estimated with high accuracy.
  • Yu ZHANG, Jianhua ZHANG, Guangyi LIU, Ping ZHANG
    原稿種別: PAPER
    専門分野: Antennas and Propagation
    2009 年 E92.B 巻 4 号 p. 1300-1307
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    The use of cross-polarized antennas for multiple-input multiple-output (MIMO) systems is receiving attention as they are able to double the number of antenna for half antenna spacing needs. This paper presents the channel correlation property of the 3rd Generation Partner Project (3GPP)/3GPP2 spatial channel model (SCM) with the polarization propagation. The statistical average of the per path polarization correlation given random cross-polarization discrimination (XPD) with co-located ideal tilted dipole antennas is derived. The impact on the random behavior of the polarization correlation due to the slant offset angle, the per path angular spread (AS), and the random XPD is analyzed. The simulation results show that the variation of polarization correlation caused by the random XPD is maximized with a 58° slant offset angle under the assumptions of all predefined scenarios in SCM. The per path AS has minor impact on the statistics of the polarization correlations. The randomness of polarization correlation is negligible for an XPD with small standard deviation.
  • Peng ZHOU, Yiming PI
    原稿種別: PAPER
    専門分野: Sensing
    2009 年 E92.B 巻 4 号 p. 1308-1317
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    An effective operation mode and a space-time synchronization technique for the spaceborne/airborne hybrid bistatic synthetic aperture radar (SA-BSAR) using sources of opportunity are presented. Ourmotivation lies in the fact that the existing approaches in the literature, where the transmitter antenna must be steered, can only be used in the hybrid bistatic SAR systems with cooperative transmitter. The presented mode is to widen the receiving beam for the purpose to increase the scene extension in azimuth. The inspiration comes from the much shorter receiving distance as compared to the one in mono-static spaceborne SAR. This means that the receiving gain can be significantly reduced to provide the same signal-to-noise ratio (SNR) with respect to the mono-static case. The feasibility of the wide-beam mode is first preliminarily verified by a quantitative analysis of SNR and a demonstration that the pulse repetition frequency (PRF) used in the spaceborne illuminator can easily satisfy the PRF constraints of the SA-BSAR. The influence on the azimuth ambiguity to signal ratio (AASR) is also discussed and the corresponding broadening factor of the maximum allowable for receiver beamwidth is subsequently derived. Afterwards, the formulae for calculating the overlap time, the scene extension and the azimuth resolution are deduced. As there are no grating lobes in satellite antenna pattern since the non-cooperative illuminator normally operates in the side-looking mode, an existing technique for the space-time synchronization in cooperative hybrid systems can not be directly applied. The modification performed and its underlying principle are presented in detail. The simulation results demonstrate the effectiveness of the wide-beam mode, and show that in most cases a useful scene extension (on the order of at least 1km) can be achieved with a roughly equivalent azimuth resolution as compared to the one in mono-static spaceborne SAR. In some cases, explicit measures to suppress the azimuth ambiguity must be taken to achieve the expected scene extension.
  • Liang CHEN, Lenan WU
    原稿種別: PAPER
    専門分野: Sensing
    2009 年 E92.B 巻 4 号 p. 1318-1325
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    A novel method is proposed to track the position of MS in the mixed line-of-sight/non-line-of-sight (LOS/NLOS) conditions in cellular network. A first-order markov model is employed to describe the dynamic transition of LOS/NLOS conditions, which is hidden in the measurement data. This method firstly uses modified EKF banks to jointly estimate both mobile state (position and velocity) and the hidden sight state based on the the data collected by a single BS. A Bayesian data fusion algorithm is then applied to achieve a high estimation accuracy. Simulation results show that the location errors of the proposed method are all significantly smaller than that of the FCC requirement in different LOS/NLOS conditions. In addition, the method is robust in the parameter mismodeling test. Complexity experiments suggest that it supports real-time application. Moreover, this algorithm is flexible enough to support different types of measurement methods and asynchronous or synchronous observations data, which is especially suitable for the future cooperative location systems.
  • Yuang-Shung LEE, Yin-Yuan CHIU, Ming-Wang CHENG, Yi-Pin KO, Sung-Hsin ...
    原稿種別: PAPER
    専門分野: Energy in Electronics Communications
    2009 年 E92.B 巻 4 号 p. 1326-1336
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    The proposed quasi-resonant (QR) zero current switching (ZCS) switched-capacitor (SC) converter is a new type of bidirectional power flow control conversion scheme. The proposed converter is able to provide voltage conversion ratios from $-$3/$-$${1 \over 3}$ (triple-mode/trisection-mode) to $-n/-$${1 \over n}$ ($-$n-mode/$-$${1 \over n}$-mode) by adding a different number of switched-capacitors and power MOSFET switches with a small series connected resonant inductor for forward and reverse power flow control schemes. It possesses the advantages of low switching losses and current stress in this QR ZCS SC converter. The principle of operation, theoretical analysis of the proposed triple-mode/trisection-mode bidirectional power conversion scheme is described in detail with circuit model analysis. Simulation and experimental studies are carried out to verify the performance of the proposed inverting type ZCS SC QR bidirectional converter. The proposed converters can be applied to battery equalization for battery management system (BMS).
  • Jae-Ho CHOI, Sang-Hyun PARK, Myong-Soo LEE, SangKeun LEE
    原稿種別: PAPER
    専門分野: Broadcast Systems
    2009 年 E92.B 巻 4 号 p. 1337-1345
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    With the growth of wireless computing and the popularity of eXtensible Markup Language (XML), wireless XML data management is emerging as an important research area. In this paper, cache invalidation methodology with XML update is addressed in wireless computing environments. A family of XML cache invalidation strategies, called S-XIR, D-XIR and E-XIR, is suggested. Using S-XIR and D-XIR, the unchanged part of XML data, only its structure changes, can be effectively reused in client caching. E-XIR, which uses prefetching, can further improve access time. Simulations are carried out to evaluate the proposed methodology; they show that the proposed strategies improve both tuning time and access time significantly. In particular, the proposed strategies are on average about 4 to 12 times better than the previous approach in terms of tuning time.
  • Dae-Ki HONG, Hyun-Seo OH, Bub-Joo KANG
    原稿種別: LETTER
    専門分野: Transmission Systems and Transmission Equipment for Communications
    2009 年 E92.B 巻 4 号 p. 1346-1348
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    In this letter, a simple product code is proposed for constant-amplitude biorthogonal multicode (CABM) modulation. In CABM modulation, vertical redundant bits are used for constant amplitude coding. The proposed product code can be constructed by using additional horizontal redundant bits. The hardware complexity of the encoder and decoder pair is very low. Simulation results show that the bit error rate performance of the system with the proposed coding scheme is improved as compared with conventional CABM demodulation.
  • Yusung LEE, Namshik KIM, Hyuncheol PARK
    原稿種別: LETTER
    専門分野: Transmission Systems and Transmission Equipment for Communications
    2009 年 E92.B 巻 4 号 p. 1349-1352
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    In this letter, we derive an exact bit error rate (BER) expression for downlink multi-carrier code division multiple access (MC-CDMA) systems with orthogonal restoring combining (ORC) in Nakagami-m fading channel. A simple approximated expression is also provided. For uncoded and coded MC-CDMA systems, the BER expressions are calculated based on the moment generating function (MGF) of the combined fading random variable. The derived analytic expressions are verified by simulation results.
  • Kou KIKUTA, Masahiro NISHIDA, Daisuke ISHII, Satoru OKAMOTO, Naoaki YA ...
    原稿種別: LETTER
    専門分野: Switching for Communications
    2009 年 E92.B 巻 4 号 p. 1353-1356
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    A multi-domain GMPLS layer-2 switch capable network with VLAN tag swapping is demonstrated for the first time. In this demonstration, we verify three new features, establishing path with designating VLAN IDs, swapping VLAN ID on prototype switch, and management of VLAN IDs per domain. Using those three features, carrier-class Ethernet backbone networks which supports path route designation in multi-domain network can be established.
  • Jeong Geun KIM
    原稿種別: LETTER
    専門分野: Network
    2009 年 E92.B 巻 4 号 p. 1357-1360
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    In this paper we propose a novel RFID anti-collision technique that intelligently combines polling and random access schemes. These two fundamentally different medium access control protocols are coherently integrated in our design while functionally complementing each other. The polling mode is designed to enable fast collision-free identification for the tags that exist within reader's coverage across the sessions. In contrast, the random access mode attempts to read the tags uncovered by the polling mode. Our proposed technique is particularly suited for a class of RFID applications in which a stationary reader periodically attempts to identify the tags with slow mobility. Numerical results show that our proposed technique yields much faster identification time against the existing approaches under various operating conditions.
  • Takayuki FUJIWARA, Eiji OKI, Kohei SHIOMOTO
    原稿種別: LETTER
    専門分野: Network
    2009 年 E92.B 巻 4 号 p. 1361-1364
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    A call admission control (CAC) scheme based on statistical information is proposed, called the statistical CAC scheme. A conventional scheme needs to manage session information for each link to update the residual bandwidth of a network in real time. This scheme has a scalability problem in terms of network size. The statistical CAC rejects session setup requests in accordance to a pre-computed ratio, called the rejection ratio. The rejection ratio is computed by using statistical information about the bandwidth requested for each link so that the congestion probability is less than an upper bound specified by a network operator. The statistical CAC is more scalable in terms of network size than the conventional scheme because it does not need to keep accommodated session state information. Numerical results show that the statistical CAC, even without exact session state information, only slightly degrades network utilization compared with the conventional scheme.
  • Tae-Ho IM, Jaekwon KIM, Yong-Soo CHO
    原稿種別: LETTER
    専門分野: Wireless Communication Technologies
    2009 年 E92.B 巻 4 号 p. 1365-1368
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    In this letter, we propose a novel signal detection method, reduced complexity QRM-MLD, which achieves almost identical error performance to that of the conventional QRM-MLD while significantly reducing the computational complexity.
  • Bao Quoc VO-NGUYEN, Hyung Yun KONG
    原稿種別: LETTER
    専門分野: Wireless Communication Technologies
    2009 年 E92.B 巻 4 号 p. 1369-1372
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    Cooperative transmission is an efficient approach to improve the performance of wireless communications over fading channels without the need for physical co-located antenna arrays. In this paper, we propose a novel cooperative protocol with selective decode-and-forward relays and generalized selection combining (GSC) technique at destination. The advantage of this scheme is that it not only allows us to optimize the structure of destination but also to fully exploit the diversity offered by the channels with an appropriate number of chosen strongest paths. For an arbitrary number of relays, an exact and closed-form expression of the Symbol Error Rate (SER) is derived for M-ary PSK in independent but not identically distributed Rayleigh fading channels. Various simulations are performed and their results exactly match the results of analyses.
  • Janghoon YANG, Yohan KIM, Dong Ku KIM
    原稿種別: LETTER
    専門分野: Wireless Communication Technologies
    2009 年 E92.B 巻 4 号 p. 1373-1375
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    In this letter, a closed form of the sum rate for multiple random beamforming is derived. A numerical evaluation verifies the tightness of the proposed solution to sample average of the sum rate.
  • Younggoo HAN, Woochul SHIM, Sehun KIM
    原稿種別: LETTER
    専門分野: Wireless Communication Technologies
    2009 年 E92.B 巻 4 号 p. 1376-1379
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    This study investigates subcarrier and power allocation schemes in an OFDMA downlink system. To consider client demands, a goal programming approach is proposed. The proposed algorithm minimizes the weighted sum of each client's dissatisfaction index. Simulations show that the sum of dissatisfaction indices can be reduced significantly.
  • Sandra ROGER, Alberto GONZALEZ, Vicenc ALMENAR, Antonio M. VIDAL
    原稿種別: LETTER
    専門分野: Wireless Communication Technologies
    2009 年 E92.B 巻 4 号 p. 1380-1383
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    It is known that MIMO channel matrix condition number influences detectors performance. Several authors have proposed combined decoders, mainly suboptimal, to cope with this fact. These combined algorithms require an estimation of the MIMO channel matrix condition number and a selection of a suitable threshold condition number. This letter presents practical algorithms to carry out the referred tasks and shows their performance in practice.
  • Lanqi NIU, Taiyi ZHANG
    原稿種別: LETTER
    専門分野: Wireless Communication Technologies
    2009 年 E92.B 巻 4 号 p. 1384-1387
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    In this letter, a new joint precoding and decoding design scheme for multiuser MIMO downlink is proposed which dispenses with iterative operations and can achieve better performance. This scheme introduces zero-force processing into minimum mean square error (MMSE) design scheme to avoid iterative operations. We derived closed-form precoders and decoders and transmit power allocation strategy of proposed design scheme, validated performance of proposed design scheme by computer simulation. The simulation results show that the proposed design scheme can achieve better bit error rate (BER) and sum capacity performance compared to an existing non-iterative design scheme.
  • Ali Ramadan ALI, Tariq J. KHANZADA, Abbas OMAR
    原稿種別: LETTER
    専門分野: Wireless Communication Technologies
    2009 年 E92.B 巻 4 号 p. 1388-1391
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    Time-variant channels degrade the performance of Orthogonal Frequency Division Multiplexing (OFDM) systems because they collapse the orthogonality between the sub-carriers, which necessitates estimating the resulting off-diagonals of the channel matrix in order to properly equalize the received signal. This letter presents a new method of estimating the channel matrix for OFDM systems in rapidly time-variant channels. The method approximates the time variation of the channel over a few successive OFDM symbols making use of Newton polynomial interpolation.
  • Chan-ho AN, Janghoon YANG, Seunghun JANG, Dong Ku KIM
    原稿種別: LETTER
    専門分野: Wireless Communication Technologies
    2009 年 E92.B 巻 4 号 p. 1392-1396
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    In this letter, a pre-processed lattice reduction (PLR) scheme is developed for the lattice reduction aided (LRA) detection of multiple input multiple-output (MIMO) systems in spatially correlated channel. The PLR computes the LLL-reduced matrix of the equivalent matrix, which is the product of the present channel matrix and unimodular transformation matrix for LR of spatial correlation matrix, rather than the present channel matrix itself. In conjunction with PLR followed by recursive lattice reduction (RLR) scheme [7], pre-processed RLR (PRLR) is shown to efficiently carry out the LR of the channel matrix, especially for the burst packet message in spatially and temporally correlated channel while matching the performance of conventional LRA detection.
  • Wei GUAN, Hanwen LUO, Chengyu LIN
    原稿種別: LETTER
    専門分野: Wireless Communication Technologies
    2009 年 E92.B 巻 4 号 p. 1397-1400
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    We introduce a novel power allocation scheme for decode-and-forward relaying system with partial channel state (CSI) information, i.e., the source knows full CSI of source-relay link but only statistical CSI of source-destination and relay-destination links. Our objective is to minimize the outage probability by jointly allocating the transmit power between the source and relays. To avoid exhaustive search, the MAOP scheme and the MMS scheme are proposed to approach the optimal allocation in the high and low signal-to-noise ratio regimes, respectively.
  • Chie DOU, Yu-Ming LI
    原稿種別: LETTER
    専門分野: Terrestrial Radio Communications
    2009 年 E92.B 巻 4 号 p. 1401-1403
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    This letter derives the packet error rate (PER) in terms of the retry limit and the channel error probability in wireless local area networks (WLANs), when an additional number of retries is allocated to a block of packets to be transmitted. We prove that the lower bound of the PER is the dropping probability which is defined as the probability of any given packet being dropped after its retry limit has been reached.
  • I-Fong CHEN, Chia-Mei PENG, Ching-Chih HUNG, Han-Chao CHEN
    原稿種別: LETTER
    専門分野: Antennas and Propagation
    2009 年 E92.B 巻 4 号 p. 1404-1405
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    The ability of a modified bow-tie dipole antenna, which has an asymmetric-feed structure to operate at UHF-band (470-862MHz) and dual ISM-band (2.4GHz and 5.8GHz) is demonstrated. Experimental results indicate that the VSWR 2: 1 bandwidths achieved were 125.7%, 8.2% and 23.6% at 660MHz, 2.45GHz and 5.5GHz. The proposed modified bow-tie dipole exhibits a nearly omni-directional radiation pattern with very easy to fabricate structure, and so is suitable for various commercial wideband applications.
  • Hyo Joon EOM, Mi Jeong KIM, Jang Soo OCK
    原稿種別: LETTER
    専門分野: Antennas and Propagation
    2009 年 E92.B 巻 4 号 p. 1406-1409
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    A mode-matching model for an electromagnetically coupled coaxial dipole array antenna is presented. The Fourier transfor m/series technique is used to represent the continuous and discrete modes of scattered fields. The mode-matching is utilized to constitute a set of simultaneous equations for discrete modal coefficients. Numerical computation is performed to show its radiation behavior in terms of various antenna parameters.
  • Joon Ki PAEK, Hyo Joon EOM
    原稿種別: LETTER
    専門分野: Antennas and Propagation
    2009 年 E92.B 巻 4 号 p. 1410-1413
    発行日: 2009/04/01
    公開日: 2009/04/01
    ジャーナル 認証あり
    Radiation of a Hertzian dipole placed within a cylindrical cavity with narrow slots is investigated. Narrow axial and transverse slots are considered. Scattered fields are expanded in terms of eigenfunctions and boundary conditions are enforced to obtain a set of simultaneous equations. Computations are performed to check the validity of the formulation.
feedback
Top