Special Section on Emerging Technologies and Applications for Ad Hoc and Wireless Mesh Networks
-
Yoshiaki KAKUDA
2012 Volume E95.B Issue 9 Pages
2681
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
FREE ACCESS
-
Bratislav MILIC, Miroslaw MALEK
Article type: INVITED PAPER
2012 Volume E95.B Issue 9 Pages
2682-2690
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
FREE ACCESS
There exists a considerable number of node placement models and algorithms for simulation of wireless multihop networks. However, the topologies created with the existing algorithms do not have properties of real networks. We have developed NPART (Node Placement Algorithm for Realistic Topologies) in order to resolve this fundamental issue in simulation methodology. We compare topologies generated by NPART with open wireless multihop network in Berlin. The NPART generated topologies have almost identical node degree distribution, number of cut-edges and vertices as the real network. Unlike them, topologies generated with the common node placement models have their own characteristics which are considerably different both from NPART and from reality. NPART algorithm has been developed into a tool. We propose a method and present a tool for integration of NPART with various realistic node mobility algorithms and tools, such as Citymob [1] and MOVE [2]. This integrated tool allows easy and time-efficient generation of highly complex, realistic simulation scenarios. We use the tool to evaluate effects of integration between existing open community wireless multi-hop networks and vehicular ad-hoc networks (VANETs). The evaluation shows that despite partial coverage and peculiar topological properties of open networks, they offer high levels of performance and network availability to the mobile end users, virtually identical to performance and availability of planned, dedicatedly deployed networks. Our results indicate that the integration of these networks may bring considerable benefits to all parties involved.
View full abstract
-
Tomoya TOGASHI, Kenichi MASE
Article type: PAPER
2012 Volume E95.B Issue 9 Pages
2691-2699
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
We present a novel transmission rate control method for Wireless Mesh Networks, termed Semi-Fixed Rate Control (SFRC), which incorporates the advantages of Fixed Rate Control (FRC) and Adaptive Rate Control (ARC). SFRC has two periods, which are alternately repeated: an autorate period and a fixed-rate period. A unit of an autorate period and the successive fixed-rate period is termed “rate-control period”. The duration of the rate-control period is set considerably longer than that of the autorate period. In the autorate period, RTS/CTS is used with the lowest transmission rate, transmission rate adjustment is only applied to data frames, and loss of CTS frames is not reflected in the transmission rate adjustment. In the fixed-rate period, the transmission rate that was used most frequently in the preceding autorate period (optimum rate) is fixed, and RTS/CTS is not used. Implementation of SFRC is straightforward as it uses conventional IEEE 802.11 DCF and only minor modification of the wireless LAN driver is required. SFRC, which uses a modified SampleRate, an ARC implementation in the Madwifi, (SampleRate+) in the autorate period, termed SFRC-SampleRate+, was developed. The results of real-world experiments indicate that SFRC-SampleRate+ is superior to SampleRate and SampleRate+, and is closer to FRC, which uses optimum rate on each link, in terms of throughput in wireless mesh network environments.
View full abstract
-
Woongsoo NA, Gunwoo LEE, Hyungchul BAE, Jungsuk YU, Sungrae CHO
Article type: PAPER
2012 Volume E95.B Issue 9 Pages
2700-2707
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
The IEEE has recently released IEEE 802.15.5 standard [3] to provide multi-hop mesh functions for low-rate wireless personal area networks (WPANs). In this paper, we extensively describe a link-layer reliable broadcast protocol referred to as timer-based reliable broadcast (TRB) [3] in the IEEE 802.15.5 standard. The TRB scheme exploits (1) bitmap based implicit ACK to effectively reduce the unnecessary error control messages and (2) randomized timer for ACK transmission to substantially reduce the possibility of contentions. Performance evaluation shows that the TRB scheme achieves 100% reliability compared with other schemes with expense of slightly increased energy consumption.
View full abstract
-
Jingze DAI, Yasushi YAMAO
Article type: PAPER
2012 Volume E95.B Issue 9 Pages
2708-2717
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
Performance of CSMA/CA wireless communication is severely affected by hidden terminal (HT) problem that results in failure of carrier sense and causes packet error due to collision. However, no mathematical analysis method for the HT problem has been available that takes into account actual radio environments including both fading and capture effect. This paper presents an analysis method that enables to well predict the probability of successful communication (PSC) and communication efficiency for CSMA/CA unicast communication including the interaction of data and ACK packets. Analysis of the PSC with two-dimensional HT distribution makes it easy to understand the influence of HT location and carrier sense level. Also it is shown that there is considerable difference on the PSC between fading and fading-free environments. The obtained results as well as the proposed analysis method are quite useful in CSMA/CA network design for WLAN and sensor network applications.
View full abstract
-
Ren Junn HWANG, Yu-Kai HSIAO
Article type: PAPER
2012 Volume E95.B Issue 9 Pages
2718-2727
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
This study proposes an efficient identity-based secure routing protocol based on Weil pairing, that considers symmetric and asymmetric links for Wireless Mesh Networks (WMNs). A wireless mesh network is a group of wireless mesh routers and several types of wireless devices (or nodes). Individual nodes cooperate by forwarding packets to each other, allowing nodes to communicate beyond the symmetric or asymmetric links. Asymmetric communication is a special feature of WMNs because of the wireless transmission ranges of different wireless devices may be different. The asymmetric link enhances WMN coverage. Ensuring security in WMNs has become an important issue over the last few years. Existing research on this topic tends to focus on providing security for routing and data content in the
symmetric link. However, most studies overlook the
asymmetric link in WMNs. This study proposes a novel distributed routing protocol that considers symmetric and asymmetric links. The proposed protocol guarantees the security and high reliability of the established route in a hostile environment, such as WMNs, by avoiding the use of unreliable intermediate nodes. The routes generated by the proposed protocol are shorter than those in prior studies. The major objective of the proposed protocol is to allow trustworthy intermediate nodes to participate in the path construction protocol. Using the proposed protocol, mesh clients out of mesh router wireless transmission range may discover a secure route to securely connect to the mesh router for Internet access. The proposed protocol enhances wireless mesh network coverage and assures security.
View full abstract
-
Yasuharu OHTA, Tomoyuki OHTA, Yoshiaki KAKUDA
Article type: PAPER
2012 Volume E95.B Issue 9 Pages
2728-2739
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
An ad hoc network is a decentralized network that consists of mobile nodes with wireless communication devices without the aid of access points. A Vehicular Ad-hoc NETwork (VANET) is one of the representative applications of the ad hoc network. Epidemic routing has been proposed as a routing protocol based on Store-Carry-Forward mechanism for VANET environment. However, in Epidemic Routing, network resources such as packet buffer of a node are significantly consumed because data packets are spread across the network. Therefore, this paper proposes a new autonomous clustering-based data transfer scheme using positions and moving direction of vehicles for VANETs. The autonomous clustering configures multiple clusters in the network and then only the cluster head that manages the cluster stores data packets. Whenever the cluster meets a new cluster, the cluster head of the cluster decides whether it should forward data packets to the new cluster based on its own position, the destination node's position, and moving direction of the cluster. Finally, this paper presents the simulation results to show the effectiveness of the proposed scheme.
View full abstract
-
Daichi KOMINAMI, Masashi SUGANO, Masayuki MURATA, Takaaki HATAUCHI
Article type: PAPER
2012 Volume E95.B Issue 9 Pages
2740-2750
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
Robustness is one of the significant properties in wireless sensor networks because sensor nodes and wireless links are subjected to frequent failures. Once these failures occur, system performance falls into critical condition due to increases in traffic and losses of connectivity and reachability. Most of the existing studies on sensor networks, however, do not conduct quantitative evaluation on robustness and do not discuss what brings in robustness. In this paper, we define and evaluate robustness of wireless sensor networks and show how to improve them. By computer simulation, we show that receiver-initiated MAC protocols are more robust than sender-initiated ones and a simple detour-routing algorithm has more than tripled robustness than the simple minimum-hop routing algorithm.
View full abstract
-
Atsushi TAKAHASHI, Nobuyoshi KOMURO, Shiro SAKATA, Shigeo SHIODA, Tuto ...
Article type: PAPER
2012 Volume E95.B Issue 9 Pages
2751-2758
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
In wireless single-hop networks, IEEE 802.11e Enhanced Distributed Channel Access (EDCA) is the standard for Quality of Service (QoS) control. However, it is necessary for controlling QoS to modify the currently used IEEE 802.11 Distributed Coordination Function (DCF)-compliant terminals as well as Access Points (APs). In addition, it is necessary to modify the parameter of IEEE 802.11e EDCA when the traffic is heavy. This paper proposes a novel scheme to guarantee QoS of high-priority flow with Receiving Opportunity Control in MAC Frame (ROC) employed adaptive flow control in wireless multi-hop network. In the proposed scheme, the edge APs which are directly connected to user terminals estimate the network capacity, and calculate appropriate ACK prevention probability against low-priority flow according to traffic load. Simulation evaluation results show that the proposed scheme guarantees QoS.
View full abstract
-
Jun-Li KUO, Chen-Hua SHIH, Cheng-Yuan HO, Ming-Ching WANG, Yaw-Chung C ...
Article type: PAPER
2012 Volume E95.B Issue 9 Pages
2759-2768
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
In the infrastructure-less disaster environment, the application of the peer-to-peer (P2P) group conference over mobile ad hoc network (MANET) can be used to communicate with each other when the rescue crews search the survivors but work separately. However, there still are several problems of in-time multimedia delivery in P2P-MANET: (1) MANET mobility influences the maintenance of P2P overlay. (2) P2P overlay is not proximal to MANET topology, this leads to the inefficient streaming delivery. (3) The unreliable wireless connection leads to the difficulty of multi-source P2P group conferencing. Therefore, P2P conferencing cannot work well on MANET. To overcome the above disadvantages, in this paper, we present a cross-layer P2P group conferencing mechanism over MANET, called RING (Real-time Intercommunication Network Gossip). The RING uses the ring overlay to manage peers and utilizes the cross-layer mechanism to force the ring overlay to be proximal to MANET topology. Therefore, RING can lead efficient in-time multimedia streaming delivery. On the other hand, the ring overlay can deal with peer joining/leaving fast and simply, and improves the delivery efficiency with the minimum signaling overhead. Through mathematical theory and a series of experiments, we demonstrate that RING is workable and it can shorten the source-to-end delay with minimal signaling overhead.
View full abstract
-
Xuanya LI, Linlin CI, Wenbing JIN
Article type: LETTER
2012 Volume E95.B Issue 9 Pages
2769-2773
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
Hovering unmanned aerial vehicles (UAVs) with mutual sense and communication capability form a new-fashioned airborne ad hoc network. Traditional routing protocols assume that there has already existed an end-to-end path before the message forwarding starts which, however, is not always available in the airborne network featuring randomly violent topological changes. Local heuristic information without complex computational cost should be considered to help route in this specific delay tolerant network (DTN). In this letter, we take Crowd Density (CD) and Relative Velocity Direction (RVD) as the fuzzy inputs, and use approximate reasoning to calculate priority of alternative candidates. Finally, the proposed mechanism is compared with some existing protocols.
View full abstract
-
Ling TANG, Hao CHEN, Jianhui WU
Article type: PAPER
Subject area: Fundamental Theories for Communications
2012 Volume E95.B Issue 9 Pages
2774-2784
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
We consider wireless secure communications between a source and a destination aided by a multi-antenna relay, in the presence of an eavesdropper. In particular, two cooperation schemes of the relay are explored:
cooperative relaying (CR) and
cooperative jamming (CJ). We first investigate the transmit weight optimization of CR and CJ, for both cases with and without the eavesdropper's channel state information (ECSI). Then, for the case with ECSI, we derive the conditions under which CR achieves a higher secrecy rate than CJ; for the case without ECSI, we compare the secrecy rates of CR and CJ in high transmit power regimes. Building on this, we propose a novel hybrid scheme in which the relay utilizes both CR and CJ, and study the power allocation of the relay between CR and CJ for maximizing the secrecy rate under individual power constraints. Further, we study the case with imperfect channel state information (CSI) for both CR and CJ. At last, extensive numerical results are provided.
View full abstract
-
Takahiro HIRAYAMA, Shin'ichi ARAKAWA, Ken-ichi ARAI, Masayuki MURATA
Article type: PAPER
Subject area: Fundamental Theories for Communications
2012 Volume E95.B Issue 9 Pages
2785-2793
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
Internet behavior is becoming more complex due to ever-changing networking technologies and applications. Thus, understanding and controlling the complex behavior of the Internet are important for designing future networks. One of the complex behaviors of the Internet is traffic dynamics. Previous studies revealed that flow control in the transport layer affects the traffic dynamics of the Internet. However, it is not clear how the topological structure impacts traffic dynamics. In this paper, we investigate packet delay dynamics and traffic fluctuation in ISP router-level topologies where the degree distribution exhibits a power-law nature, and the nodes interact via end-to-end feedback control functionality. We show the packet delay dynamics of the BA topologies generated by the Barabási-Albert (BA) model and the ISP router-level topologies. Simulation results show that the end-to-end delay distributions exhibit a heavy tail in the TCP model. Moreover, the number of links with highly fluctuating queue length increases dramatically compared to that in the stop-and-wait model. Even in this case, the high-modularity structures of the ISP topologies reduce the number of highly fluctuating links compared with the BA topologies.
View full abstract
-
Norrarat WATTANAMONGKHOL, Warakorn SRICHAVENGSUP, Pisit VANICHCHANUNT, ...
Article type: PAPER
Subject area: Network
2012 Volume E95.B Issue 9 Pages
2794-2806
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
FREE ACCESS
In a shared medium communication system, mobile users contend for channel access according to a given set of rules to avoid collisions and achieve efficient use of the medium. If one or more users do not comply with the agree rules either due to selfish or malicious behaviours, they will cause some impacts on the system performance, especially to the well-behaved users. In this paper, we consider the problem of user misbehaviours on the performance of a wireless infrastructure-based network using reservation-based MAC protocols. Key misbehaving strategies possible in such a network are identified and explained. To quantify the impact of these misbehaviours upon the network performance, three different misbehaving scenarios are developed to allow a systematic investigation of each misbehaving strategy. For each scenario, we have derived mathematical formulations for evaluating and analyzing the key performance metrics, i.e., probabilities of success of well-behaved and misbehaved users and the fairness index. Numerical results show that the presence of misbehaviours can cause different levels of damage depending on the misbehavior strategy used. The combined multi-token and increasing permission probability strategies where the misbehaved user selfishly accesses the channel more times and with higher probabilities than allowed is shown to cause the most severe impairment of performance and fairness.
View full abstract
-
Soo Young MOON, Tae Ho CHO
Article type: PAPER
Subject area: Network
2012 Volume E95.B Issue 9 Pages
2807-2814
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
The wireless sensor network (WSN) is a technology that senses environmental information and provides appropriate services to users. There are diverse application areas for WSNs such as disaster prevention, military, and facility management. Despite the many prospective applications, WSN s are vulnerable to various malicious attacks. In false report attacks, a malicious attacker steals a few sensor nodes and obtains security materials such as authentication keys from the nodes. The attacker then injects false event reports to the network through the captured nodes. The injected false reports confuse users or deplete the limited energy of the nodes in the network. Many filtering schemes have been proposed to detect and remove false reports. In the statistical
en route filtering (SEF) scheme, each node shares authentication keys selected from a global key pool. Due to the limited memory, each node is able to store only a small portion of the global key pool. Therefore, the routing paths of the event reports significantly affect the filtering (i.e., detecting) probability of false reports. In this paper, we propose a method to determine the routing paths of event reports both hop by hop and on demand at each node. In this method, each node chooses the next node on the path from the event source to the sink node based on the key indexes of its neighbor nodes. Experiments show that the proposed method is far more energy efficient than the SEF when the false traffic ratio (FTR) is ≥ 50% in the network.
View full abstract
-
Ryoichi KAWAHARA, Tatsuya MORI, Takeshi YADA, Noriaki KAMIYAMA
Article type: PAPER
Subject area: Network
2012 Volume E95.B Issue 9 Pages
2815-2827
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
We investigate the impact of traffic on the performance of large-scale NAT (LSN), since it has been attracting attention as a means of better utilizing the limited number of global IPv4 addresses. We focus on the number of active flows because they drive up the LSN memory requirements in two ways; more flows must be held in LSN memory, and more global IPv4 addresses must be prepared. Through traffic measurement data analysis, we found that more than 1% of hosts generated more than 100 TCP flows or 486 UDP flows at the same time, and on average, there were 1.43-3.99 active TCP flows per host, when the inactive timer used to clear the flow state from a flow table was set to 15s. When the timer is changed from 15s to 10min, the number of active flows increases more than tenfold. We also investigate how to reduce the above impact on LSN in terms of saving memory space and accommodating more users for each global IPv4 address. We show that to save memory space, regulating network anomalies can reduce the number of active TCP flows on an LSN by a maximum of 48.3% and by 29.6% on average. We also discuss the applicability of a batch flow-arrival model for estimating the variation in the number of active flows, when taking into account that the variation is needed to prepare an appropriate memory space. One way to allow each global IPv4 address to accommodate more users is to better utilize destination IP address information when mapping a source IP address from a private address to a global IPv4 address. This can effectively reduce the required number of global IPv4 addresses by 85.9% for TCP traffic and 91.9% for UDP traffic on average.
View full abstract
-
Nagao OGINO, Hajime NAKAMURA
Article type: PAPER
Subject area: Network
2012 Volume E95.B Issue 9 Pages
2828-2837
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
For real-time services, such as VoIP and videoconferencing supplied through a multi-domain MPLS network, it is vital to guarantee end-to-end QoS of the inter-domain paths. Thus, it is important to allocate an appropriate QoS class to the inter-domain paths in each transit domain. Because each domain has its own policy for QoS class allocation, each domain must then allocate an appropriate QoS class adaptively based on the estimation of the QoS class allocation policies adopted in other domains. This paper proposes an adaptive method for acquiring a QoS class allocation policy through the use of reinforcement learning. This method learns the appropriate policy through experience in the actual QoS class allocation process. Thus, the method can adapt to a complex environment where the arrival of inter-domain path requests does not follow a simple Poisson process and where the various QoS class allocation policies are adopted in other domains. The proposed method updates the allocation policy whenever a QoS class is actually allocated to an inter-domain path. Moreover, some of the allocation policies often utilized in the real operational environment can be updated and refined more frequently. For these reasons, the proposed method is designed to adapt rapidly to variances in the surrounding environment. Simulation results verify that the proposed method can quickly adapt to variations in the arrival process of inter-domain path requests and the QoS class allocation policies in other domains.
View full abstract
-
Heng CHEN, Depei QIAN, Weiguo WU
Article type: PAPER
Subject area: Network
2012 Volume E95.B Issue 9 Pages
2838-2851
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
The location-based routing protocol has proven to be scalable and efficient in large wireless sensor networks with mobile sinks. A great challenge in location-based routing protocols is the design of scalable distributed location service that tracks the current locations of mobile sinks. Although various location services have been proposed in the literature, hierarchical-based location services have the significant advantage of high scalability. However, most of them depend on a global hierarchy of grids. A major disadvantage of this design is that high control overhead occurs when mobile sinks cross the boundaries of the top level grids. In this paper, we introduce Hierarchical Ring Location Service (HRLS) protocol, a practical distributed location service that provides sink location information in a scalable and distributed manner. In contrast to existing hierarchical-based location services, each sink in HRLS constructs its own hierarchy of grid rings distributively. To reduce the communication overhead of location update, sinks utilize the lazy update mechanism with their indirect location. Once a sensor node detects a target, it queries the location of a sink by sending request packets in eight directions. HRLS is evaluated through mathematical analysis and simulations. Compared with a well-known hierarchical-based location service, our results show that HRLS provides a more scalable and efficient distributed location service in scenarios with various network size, sink mobility and increasing number of source nodes.
View full abstract
-
Atsushi KOBAYASHI, Shingo KASHIMA, Toshihiko KATO
Article type: PAPER
Subject area: Network Management/Operation
2012 Volume E95.B Issue 9 Pages
2852-2860
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
This paper presents a method of measuring the traffic of IP multicast streaming, such as IPTV, by using IPFIX and PSAMP. The IP multicast streaming service has recently become one of the popular network services, but no IP multicast operation method has been established yet. In particular, traffic measurement of IP multicast streaming encounters two challenges: as monitoring a multicast path tree and QoS measurement. There is no method to monitor them continuously in large-scale networks. Hence, we explore measurement structure suitable for large-scale networks, and then using IPFIX and PSAMP, we propose an efficient a network-level quality measurement method for IPTV and a method to extract multicast path tree data. In addition, we demonstrate the feasibility of the measurement method by evaluating a prototype system.
View full abstract
-
Hiroki MORI, Yuji TOHZAKA, Tsuguhide AOKI, Yasuhiko TANABE
Article type: PAPER
Subject area: Antennas and Propagation
2012 Volume E95.B Issue 9 Pages
2861-2869
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
In a downlink multi-user multiple-input multiple-output (MU-MIMO) system, the vector perturbation (VP) method, which is one of the non-linear precoding methods, is a promising technique with which to maximize the channel capacity. In the VP method, the receiver requires the modulo operation to remove the perturbation signal added at the transmitter. However, owing to noise, the modulo operation may not run correctly which makes the soft demapper produce unreliable log-likelihood ratios (LLRs), resulting in a degradation of system throughput. To enhance the throughput performance, we propose a method that expands the basic perturbation interval and adaptively controls the expansion rate according to the modulation and coding scheme (MCS). The optimum expansion rate is derived by link-level simulation and the system throughput is measured by system-level simulation. The system-level simulation results show that the proposed VP method can obtain higher throughput than the conventional VP method.
View full abstract
-
Satoshi YAMAGUCHI, Yukihiro TAHARA, Toru TAKAHASHI, Kazushi NISHIZAWA, ...
Article type: PAPER
Subject area: Antennas and Propagation
2012 Volume E95.B Issue 9 Pages
2870-2877
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
Slotted-waveguide array antennas are attractive because of their low-loss characteristics at high frequencies. Several types of slotted arrays whose polarization angles are inclined to the waveguide axis have been reported. In this paper, we propose a new type of slot array antenna on a rectangular coaxial line for minimizing the waveguide width. As opposed to a conventional waveguide, there is no “cut-off” concept in our proposal because the coaxial line is a transverse electromagnetic (TEM) line. Therefore it is possible to guide the wave even if the diameter of the line is much smaller than that of the waveguide. Moreover, the proposed antenna is a resonant slot array antenna that is based on standing-wave excitation and is thus different from traveling-wave antennas (such as a leaky coaxial cable (LCX)).
View full abstract
-
Fan LIU, Hongbo XU, Jun LI, Hongxing XIA
Article type: PAPER
Subject area: Wireless Communication Technologies
2012 Volume E95.B Issue 9 Pages
2878-2883
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
This paper designs the closed-form precoding matrices for non-regenerative MIMO relay system with the direct link. A multiple power constrained non-convex optimization problem is formulated by using the minimum-mean-squared error (MMSE) criterion. We decompose the original problem into two sub-problems. The relay transceiver Wiener filter structure is first rigorously derived, then the source transmit and destination receive matrices are jointly designed by solving an equivalent dual problem. Through our proposed joint iterative algorithm, the closed-form solutions can be finally obtained. The effectiveness of our proposed scheme is validated by simulations with comparison to some of the existing schemes.
View full abstract
-
Ji-Woong CHOI, Jungwon LEE, Jihwan P. CHOI, Hui-Ling LOU
Article type: PAPER
Subject area: Wireless Communication Technologies
2012 Volume E95.B Issue 9 Pages
2884-2891
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
In this paper, we propose a soft-decoding near-ML MIMO demodulation scheme that achieves near optimal performance with fixed and low complexity. Exploiting the regular structure of bit-to-symbol mapping, the proposed scheme performs hard demodulation to find the first candidate symbol for each stream followed by selection of nearby candidate points such that at least one candidate exists for the computation of likelihood information of bit 0 and 1 without intermediate calculation of the Euclidean distance. This demodulation scheme enables an improvement in performance by guaranteeing the existence of candidates and a significant reduction in the number of distance calculations which is a major complexity burden. The performance is evaluated by computer simulation, and computational complexity is also assessed in terms of the number of complex multiplication.
View full abstract
-
Razvan BEURAN, Junya NAKATA, Yasuo TAN, Yoichi SHINODA
Article type: PAPER
Subject area: Terrestrial Wireless Communication/Broadcasting Technologies
2012 Volume E95.B Issue 9 Pages
2892-2905
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
IEEE 802.15.4 based devices are a key component for mobile and pervasive computing. However, their small dimensions and reduced resources, together with the intrinsic properties of wireless communication, make it difficult to evaluate such networked systems through real-world trials. In this paper we present an emulation testbed intended for the evaluation of IEEE 802.15.4 networked systems. The testbed builds on the generic framework of the wireless network testbed QOMB, and adds IEEE 802.15.4 network, processor and sensing emulation functionality. We validated the testbed through a series of experiments carried out both through real-world trials in a smart home environment, and through emulation experiments on our testbed. Our results show that one can accurately, and in real time, execute IEEE 802.15.4 network applications on our testbed in an emulated environment that reproduces closely the real scenario.
View full abstract
-
Farid GHANI, Abdul KADER, Ekram KHAN, Badlishah AHMAD
Article type: PAPER
Subject area: Multimedia Systems for Communications
2012 Volume E95.B Issue 9 Pages
2906-2913
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
This paper presents a memory efficient version of set partitioning in hierarchical tree (SPIHT). The proposed coder called Memory Efficient SPIHT (MESH) uses a single re-usable list instead of three continuously growing linked lists as in conventional SPIHT. The list is re-initialized at the beginning of each bit-plane (coding pass) and is exhausted within the same bit-plane. Another feature of the proposed coder is that it uses a single pass for each bit-plane by merging the sorting and refinement passes of the conventional version of SPIHT. The performance of the proposed coder is measured in terms of coding efficiency, and the worst case dynamic memory requirements due to the list entries in each bit-plane. Performance comparison with SPIHT shows that the proposed coder reduces the dynamic memory requirement by about 50-70% compared to the SPIHT while retaining its coding efficiency.
View full abstract
-
Suhan CHOI, Hichan MOON
Article type: LETTER
Subject area: Fundamental Theories for Communications
2012 Volume E95.B Issue 9 Pages
2914-2917
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
In this letter, distributed source coding with one distortion criterion and correlated messages is considered. This problem can be regarded as “Berger-Yeung problem with correlated messages”. It corresponds to the source coding part of the graph-based framework for transmission of a pair of correlated sources over the multiple-access channel where one is lossless and the other is lossy. As a result, the achievable rate-distortion region for this problem is provided. A rigorous proof of both achievability and converse part is also given.
View full abstract
-
Won-Yong SHIN, Koji ISHIBASHI
Article type: LETTER
Subject area: Fundamental Theories for Communications
2012 Volume E95.B Issue 9 Pages
2918-2921
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
The impact and benefits of infrastructure support are shown by introducing an achievable throughput scaling law of a ultra-wide band (UWB) ad hoc network in which
m base stations (BSs) are regularly located. The existing multi-hop scheme consisting of two variants, with and without BS help, is utilized with a slight modification. Our result indicates that the derived throughput scaling depends on the path-loss exponent due to the power-limited characteristics for all operating regimes examined. Furthermore, it is shown that the total throughput scales linearly with parameter
m as
m is larger than a certain level. It thus turns out the use of infrastructure is also helpful in improving the throughput scaling of UWB networks in some conditions.
View full abstract
-
Lin-Lin TANG, Jeng-Shyang PAN, Hao LUO, Junbao LI
Article type: LETTER
Subject area: Fundamental Theories for Communications
2012 Volume E95.B Issue 9 Pages
2922-2925
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
A novel watermarked MDC system based on the SFQ algorithm and the sub-sampling method is proposed in this paper. Sub-sampling algorithm is applied onto the transformed image to introduce some redundancy between different channels. Secret information is embedded into the preprocessed sub-images. Good performance of the new system to defense the noise and the compression attacks is shown in the experimental results.
View full abstract
-
Qinjuan ZHANG, Muqing WU, Qilin GUO, Rui ZHANG, Chao Yi ZHANG
Article type: LETTER
Subject area: Fundamental Theories for Communications
2012 Volume E95.B Issue 9 Pages
2926-2930
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
Channel estimation using data-dependent superimposed training (DDST) is developed to doubly selective channels of Orthogonal Frequency Division Multiplexing (OFDM) systems; it consumes no extra bandwidth. An Inter-carrier interference (ICI) Self-cancelation method based on DDST scheme, IS-DDST, is designed which mitigates the interference from adjacent subcarriers to estimation. Moreover, a dual-iteration detection method is proposed to mitigate the ICI for IS-DDST scheme. Theoretical analysis and simulations show that the proposed scheme can achieve better Mean Square Error (MSE) and Bit Error Ratio (BER) performance than the existing DDST based scheme.
View full abstract
-
Yung-Yi WANG
Article type: LETTER
Subject area: Transmission Systems and Transmission Equipment for Communications
2012 Volume E95.B Issue 9 Pages
2931-2935
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
This study proposes an improved per-survivor-processing (PSP) scheme to tackle the phase error issue in the convolutionally coded OFDM systems. The proposed approach takes advantage of the trellis structure of the convolutional codes to compensate the symbol-time-offset (STO) caused phase error in frequency domain. Unlike the traditional PSP scheme which simply estimates the phase error by using a state-based horizontal process, the proposed approach develops an extra state-wise vertical process which selects the most likely phase estimate as the survival phase in each trellis stage and then accordingly align the phase of all states to this survival phase before moving to next trellis stage of the PSP scheme. With the vertical process, the resultant phase estimate is more reliable than that of the conventional PSP scheme and hence improve the accuracy in data decoding. Computer simulations confirm the validity of the proposed approach.
View full abstract
-
Nan WU, Chaoxing YAN, Jingming KUANG, Hua WANG
Article type: LETTER
Subject area: Transmission Systems and Transmission Equipment for Communications
2012 Volume E95.B Issue 9 Pages
2936-2938
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
A low complexity log-likelihood ratio (LLR) calculation for high-order amplitude phase shift keying (APSK) signals is proposed. Using proper constellation partitioning together with a look-up table, the number of terms for the comparison of Euclidean distances can be significantly reduced. Compared with the log-sum LLR approximation, the proposed method reduces the computational complexity by more than 65% and 75% for 16-APSK and 32-APSK signals, respectively, with very small bit error rate performance degradation.
View full abstract
-
Nowon KIM, Kyungran KANG, Young-Jong CHO
Article type: LETTER
Subject area: Network
2012 Volume E95.B Issue 9 Pages
2939-2943
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
Wireless multimedia sensor networks tend to generate a large number of sensing data packets within a short period. A multi-channel TDMA scheme can avoid the hidden terminal problem and and has been shown to achieve higher performance than the CSMA scheme. In order to deliver large volumes of sensing data within a time limit, our scheme for
minigroup multicast can improve the performance gain of the multi-channel TDMA by incorporating deflection routing which constrains any intermediate nodes from serving multiple sessions and establishes a new path detour the nodes on the existing path of multicast sessions. Through simulations, we show that, even though the deflection routing builds non-optimal paths, our scheme supports 95% packet delivery ratio and higher throughput than the legacy multicast routing protocol with CSMA-based media access control.
View full abstract
-
Yunbum CHOI, Ikram SYED, Hoon KIM
Article type: LETTER
Subject area: Network
2012 Volume E95.B Issue 9 Pages
2944-2947
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
Sensor deployment to achieve better system performance is one of the critical issues in wireless sensor networks (WSN). This letter proposes an effective sensor deployment scheme for large area sensor networks, where the event occurrence rate varies over the sensor-deployed region. Based on local event occurrence rate, the proposed scheme determines the number of sensors that should be deployed in each local region to maximize the overall detection probability. Simulation results show that the sensor deployment by the proposed scheme improves detection capability by 21% in comparison to the Incidence algorithm.
View full abstract
-
Zan YANG, Yuping ZHAO
Article type: LETTER
Subject area: Network
2012 Volume E95.B Issue 9 Pages
2948-2951
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
In this letter, we propose a framework for scalable video multicast, which exploits the scalability of scalable video and the multiuser diversity of OFDMA systems. We further propose a resource allocation algorithm which guarantees the base-quality video for all users, and improves the transmission efficiency for users with good channel conditions.
View full abstract
-
Wonjong NOH, Jihoon LEE, Sangkyung KIM
Article type: LETTER
Subject area: Network
2012 Volume E95.B Issue 9 Pages
2952-2955
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
This paper proposes a new on-demand routing protocol. It aims to establish a redundant route path containing intermediate nodes having relatively more synchronized neighbor nodes in a possible route. This approach can localize the effects of route failures and reduce route reconfiguration time by enhancing the reachability to the destination node without source-initiated route re-discoveries at route failures. Simulation results show that it has better performance than AODV and TORA.
View full abstract
-
Heejun ROH, Hoorin PARK, Cheoulhoon JUNG, Ding-Zhu DU, Wonjun LEE
Article type: LETTER
Subject area: Network
2012 Volume E95.B Issue 9 Pages
2956-2958
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
A price-based spectrum investment and pricing scheme in cooperative cognitive radio networks is presented to use wireless resource more efficiently in technical and economic aspects. We analyze the impact of cooperative communications and the relationship between spectrum hole cost and leasing cost in the optimal decision of SAP.
View full abstract
-
Yoshiyuki YAMADA, Hiroshi HASEGAWA, Ken-ichi SATO
Article type: LETTER
Subject area: Network
2012 Volume E95.B Issue 9 Pages
2959-2963
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
This study compares the performances of waveband protection and wavelength path protection in survivable hierarchical optical path networks. Network costs and the number of switching operations necessary are evaluated for different ratios of protected demand. Numerical results demonstrate that waveband protection can drastically decrease the number of switching operations in the case of failure, while both waveband and wavelength path protection effectively reduce the network resources needed compared to single layer optical path networks.
View full abstract
-
Sewon HAN, Byung-Seo KIM
Article type: LETTER
Subject area: Network
2012 Volume E95.B Issue 9 Pages
2964-2967
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
Unlike analogue voice signal-oriented and narrowband-based conventional tactical systems, the future tactical networks will deal with packet-based voice traffic over a wide channel bandwidth. In this paper, a method is proposed to improve the performance of voice packet transmission for MIL-STD-188-220 military standard-based wideband communication systems. By utilizing Bump-Slots for voice packet transmissions, significant improvements are achieved. This is confirmed by extensive simulations.
View full abstract
-
Iksoon HWANG, Jaesung PARK
Article type: LETTER
Subject area: Network Management/Operation
2012 Volume E95.B Issue 9 Pages
2968-2971
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
In this letter, we propose a packet loss probability (PLP) assessment method that uses active measurements. Considering the statistical nature of measurement data in a network, we adopt the confidence interval to assess whether the performance of a network complies with a target PLP or not. Using both analysis and simulations, we show that the proposed method can guarantee that the probabilities of erroneous assessments are not more than a given significance level. In addition, we provide a systematic method to determine the number of probing packets needed for statistical assurance by presenting a clear relation between the assessment accuracy and the measurement overhead.
View full abstract
-
Rubén Pavel MURILLO-PÉREZ, Carmen Beatriz RODRÍGU ...
Article type: LETTER
Subject area: Network Management/Operation
2012 Volume E95.B Issue 9 Pages
2972-2975
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
In this letter a general admission control strategy is proposed and mathematically analyzed. Fractional buffering finely adjusts different QoS metrics allowing them to simultaneously achieve their maximum acceptable values, maximizing system capacity. Fractional buffering also allows the adequate and fair performance comparison among different resource management strategies and/or evaluation scenarios.
View full abstract
-
Wei WANG, Xian-peng WANG, Xin LI
Article type: LETTER
Subject area: Antennas and Propagation
2012 Volume E95.B Issue 9 Pages
2976-2978
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
A low-complexity method for angle estimation in Multiple-input multiple-output radar (MIMO) radar is presented. In this approach, the signal subspace can be spanned by the orthogonal vectors which are obtained by Multi-stage Wiener Filter (MSWF), then the ESPRIT method can be used to estimate direction of departures (DODs) and direction of arrivals (DOAs). Compared with the conventional ESPRIT algorithm, the proposed method does not involve estimation of the covariance matrix and its eigen-decomposition, which alleviates remarkably the computational complexity. Moreover, the proposed method achieves the similar angle estimation performance. Simulation results are presented to verify the efficiency of the proposed method.
View full abstract
-
Sang Kyu KIM, Jae-Yong KWON, Hyo Joon EOM, Dong-Joon LEE
Article type: LETTER
Subject area: Antennas and Propagation
2012 Volume E95.B Issue 9 Pages
2979-2982
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
Electromagnetic wave scattering in two open-ended coaxial cables with flanges is presented for adiabatic transmission line applications. Field distributions in the cables are obtained by employing the mode-matching method. A set of simultaneous equations is solved to investigate the transmission and reflection coefficients.
View full abstract
-
Jin-Hyuk KIM, Keum-Cheol HWANG, Hyeong-Seok KIM
Article type: LETTER
Subject area: Antennas and Propagation
2012 Volume E95.B Issue 9 Pages
2983-2986
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
A folded monopole antenna fed by a CPW-to-trident transition feeder for compact wireless USB dongle devices is proposed. The antenna's dimensions are 16×44.8×3.5mm
3, so it is suitable for low-profile wireless USB dongles. The proposed, compact monopole antenna resonates from 2.28GHz to 10.8GHz; hence, it can cover all wireless bands including WiBro (2.3-2.4GHz), Bluetooth (2.4-2.484GHz), WiMAX (2.5-2.7GHz and 3.4-3.6GHz), satellite DMB (2.605-2.655GHz), 802.11b/g/a WLAN (2.4-2.485GHz and 5.15-5.825GHz), and UWB (3.1-10.6GHz). A fabricated antenna is tested on a laptop to investigate the effects of the keypad and LCD screen on the resonant frequency and radiation pattern. The measured average gain of the fabricated antenna ranges from -2.76dBi to 0.72dBi.
View full abstract
-
Junfeng WANG, Yue CUI, Jianfu TENG, Xiurong MA, Zenghua ZHAO
Article type: LETTER
Subject area: Antennas and Propagation
2012 Volume E95.B Issue 9 Pages
2987-2990
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
In this letter, an improved statistical simulation model with a new parameter computation method is proposed for Rayleigh fading channels. Compared with the existing simulators, the proposed model yields much higher simulation efficiency, while it can still obtain adequate approximations of the desired statistical properties.
View full abstract
-
Yuto SUZUKI, Naoki HONMA
Article type: LETTER
Subject area: Antennas and Propagation
2012 Volume E95.B Issue 9 Pages
2991-2994
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
This letter proposes a monopole multi-sector antenna with dielectric cylinder, and shows some results of simulations that examined the antenna characteristics. The dependency of radiation characteristics on relative permittivity
εr shows the lens effect with increase of
εr. Furthermore, the characteristics of the proposed antenna are improved by optimizing the termination conditions at the quiescent antennas. The backlobe level is lower than -10dB. Also, the vertical HPBW and the conical HPBW are around 70.5° and 63.4°, respectively. The optimization improved the actual gain by 2dB. It is found that the diameter of the proposed antenna is 1/3rd that of the conventional one.
View full abstract
-
Jung-In BAIK, Sung-Jin KANG, Hyoung-Kyu SONG
Article type: LETTER
Subject area: Wireless Communication Technologies
2012 Volume E95.B Issue 9 Pages
2995-2998
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
Orthogonal frequency and code division multiplexing (OFCDM) is available as orthogonal frequency and code division multiple access (OFCDMA) by allocating subcarrier to users. OFCDMA is an efficient transmission method assigning the subcarrier and the channel code according to channel state or many different environments. However, OFCDMA is hard to apply many frequency spreading codes when it is compared with OFCDM because of the restrictive subcarriers. This problem leads to decrease the frequency diversity. Therefore we propose system that combines cyclic delay diversity (CDD) with cooperative relaying system based on OFCDMA. This system complements this restrict by spatial diversity. In addition to that, the proposed system obtains diversity gain without loss of the throughput when direct-path condition is not good.
View full abstract
-
Byungwook YOO, Chungyong LEE
Article type: LETTER
Subject area: Wireless Communication Technologies
2012 Volume E95.B Issue 9 Pages
2999-3002
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
We propose linear precoders which jointly minimize the mean-squared error of estimated symbol at the destination node for cooperative multiple-input multiple-output communication systems. Unlike the existing precoders which require high computational complexity to solve the optimization problem on the direct link, the proposed precoder is expressed in a closed-form. Simulation results show that the proposed precoder outperforms the existing precoders in the low SNR region. Moreover, we observe that the proposed iterative algorithm is not sensitive to the initial matrices.
View full abstract
-
Hoc PHAN, Trung Quang DUONG, Hans-Jürgen ZEPERNICK
Article type: LETTER
Subject area: Wireless Communication Technologies
2012 Volume E95.B Issue 9 Pages
3003-3006
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
The end-to-end performance of dual-hop multiple-input multiple-output (MIMO) decouple-and-forward relaying with orthogonal space-time block code (OSTBC) transmission over Nakagami-
m fading is analyzed. By considering the multiple antennas at all nodes, we derive exact closed-form and asymptotic expressions for the outage probability and symbol error rate, which enables us to evaluate the exact performance and reveals the diversity gains of the considered system. In addition, the closed-form approximation and asymptotic expressions for the ergodic capacity are also derived. We show that OSTBC transmission over relay systems yields a unit order of multiplexing gain despite the fact that full diversity order, which is equal to the minimum fading severity between the two hops, is achieved.
View full abstract
-
Seunghyun NAM, Jong-Min PARK, Heewook KIM, Tae Chul HONG, Kunseok KANG ...
Article type: LETTER
Subject area: Wireless Communication Technologies
2012 Volume E95.B Issue 9 Pages
3007-3010
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
The periodogram scheme is a versatile method for large frequency offset estimation which requires preambles, in general, and only a few reference signals. However, the drawback of the conventional scheme is its inaccuracy in detecting the integer part of frequency offset which dominates the accuracy of frequency offset estimation. In order to increase the accuracy of the estimation, we directly interpolate a coefficient of the periodogram. The conventional periodogram and proposed schemes are compared in terms of the mean square error performance in the long term evolution system. The performance of the proposed method is compared with the conventional one and the simulation results indicate the better performance of the proposed one.
View full abstract
-
Tsui-Tsai LIN
Article type: LETTER
Subject area: Wireless Communication Technologies
2012 Volume E95.B Issue 9 Pages
3011-3014
Published: September 01, 2012
Released on J-STAGE: September 01, 2012
JOURNAL
RESTRICTED ACCESS
This letter presents a robust receiver using the generalized sidelobe canceller aided with the high-order derivative constraint technique for multicarrier code-division multiple-access (MC-CDMA) uplink against carrier frequency offset (CFO). Numerical results demonstrate the efficacy of the proposed receiver.
View full abstract