Hiroyasu OBATA Ryo HAMAMOTO Chisa TAKANO Kenji ISHIDA
Wireless local area networks (LANs) based on the IEEE802.11 standard usually use carrier sense multiple access with collision avoidance (CSMA/CA) for media access control. However, in CSMA/CA, if the number of wireless terminals increases, the back-off time derived by the initial contention window (CW) tends to conflict among wireless terminals. Consequently, a data frame collision often occurs, which sometimes causes the degradation of the total throughput in the transport layer protocols. In this study, to improve the total throughput, we propose a new media access control method, SP-MAC, which is based on the synchronization phenomena of coupled oscillators. Moreover, this study shows that SP-MAC drastically decreases the data frame collision probability and improves the total throughput when compared with the original CSMA/CA method.
Masayuki YAHIRO Kenji ISHIDA Kazumi MATSUSHIGE
In order to fabricate nano-gap electrodes for organic field effect transistors (OFETs), we proposed a simple technique to fabricate the nano-gap electrodes using over etching method. The gap was controlled about 250 nm on Si substrate. We have succeeded making nano-gap electrodes whose resistance was 7.5 TΩ. Then, the nano-gap electrodes as source-drain electrodes were applied to OFETs and characteristics were measured. The Id-Vd characteristics of the similar value as OFETs with micron channel were observed.
Ryo HAMAMOTO Chisa TAKANO Hiroyasu OBATA Masaki AIDA Kenji ISHIDA
Geocast communication provides efficient group communication services to distribute information to terminals that exist in some geographical domain. For various services which use geocast communication, ad hoc network is useful as network structure. Ad hoc networks are a kind of self-organing network where terminals communicate directly with each other without network infrastructure. For ad hoc networks, terminal power saving is an important issue, because terminals are driven by the battery powered system. One approach for this issue is reducing the radio transmission range of each terminal, but it degrades reachability of user data for each terminal. In this paper, we propose a design method for radio transmission range using the target problem to improve both terminal power saving and reachability for geocast communication in an ad hoc network. Moreover, we evaluate the proposed method considering both routing protocols and media access control protocols, and clarify the applicability of the proposed method to communication protocols.
Hiroyasu OBATA Kenji ISHIDA Satoru TAKEUCHI Shouta HANASAKI
Satellite Internet is one of the most important networks for emergency communications because of its tolerant of disasters such as earthquake. Therefore, satellite Internet has received considerable attention over recent years. However, most standard implementations of TCP congestion control method perform poorly in satellite Internet due to its high bit error rate and long propagation delay. This paper proposes a new TCP congestion control method called TCP-STAR to improve the throughput over satellite Internet. TCP-STAR has three new mechanisms, namely Congestion Window Setting (CWS) based on available bandwidth, Lift Window Control (LWC), and Acknowledgment Error Notification (AEN). CWS can resist the reduction of the transmission rate when data losses are caused by bit error. LWC is able to increase the congestion window quickly based on the estimated available bandwidth. AEN can avoid the reduction of the throughput by mis-retransmission of data. The mis-retransmission is caused by ack losses or delay. Simulations show that TCP-STAR can obtain the best throughput comparing with other TCP variants (TCP-J and TCP-WestwoodBR). Furthermore, we found that the fairness of TCP-STAR is a little lower than that of TCP-WestwoodBR. However, the fairness of TCP-STAR is equal to TCP-J.
Junichi FUNASAKA Masato BITO Kenji ISHIDA Kitsutaro AMANO
As so many software titles are now being distributed via the Internet, the number of accesses to file servers, such as FTP servers, is rapidly increasing. To prevent the concentration of accesses to the original file server, mirror servers are being introduced that contain the same directories and files as held by the original server. However, inconsistency among the mirror servers and the original server is often observed because of delivery latency, traffic congestion on the network, and management policies of the mirror servers. This inconsistency degrades the value of the mirror servers. Accordingly, we have developed an intermediate FTP proxy server system that guarantees the freshness of the files as well as preventing access concentration on the original FTP server. The system adopts per-file selection of the replicated files; most existing methods are based on per-host or per-directory selection. Therefore it can assure users of a quick, stable, and up-to-date FTP mirroring service even in the face of frequent content updates, which tend to degrade the homogeneity of services. Moreover, it can forward the retrieved files with little overhead. Tests confirmed that our system is comparable to existing systems from the viewpoint of actual retrieval time, required traffic, and load endurance. This technology can assure clients that they will receive the latest version of the file(s) desired. It well supports heterogeneous network environments such as the Internet.
Management of control functions in large computer networks is a very difficult problem. One of the effective way to overcome the difficulty is to introduce hierarchical control structure (network cluster) in the management. When a fault occurred in the cluster, routing information at some nodes in the network must be updated in order to react the fault. However, the number of such nodes can be reduced by introducing ingenious topology into the cluster. This paper presents a fundamental discussion on network topology for a network cluster. First, L-FT is defined to represent a degree of fault-tolerance in a cluster with respect to link failures. Secondly, the minimum link problem M is defined to find the minimum number of links to make the cluster L-FT. The following results are obtained. (1) For a network cluster with the fault-tolerant topology 1-FT, at least 2n-2 links have to exist in the cluster where n is the number of border nodes in the cluster. (2) As far as connectivity of the whole network is held, for multiple L link failures in a L-FT cluster, the update of routing information at each node is localized within only the cluster containing the failed links. (3) Several hierarchical networks with fault-tolerant conditions are presented as case studies for a LAN and a MAN.
Hiroyasu OBATA Kenji ISHIDA Chisa TAKANO Junichi FUNASAKA Masaaki BESSHO
Some researchers have started using the high-speed communication satellite WINDS to evaluate TCP congestion control methods. However, they do not aim to maximize TCP throughput when WINDS is paired with a Large Earth Station (LET). This paper evaluates the typical TCP performance of satellite links over a network composed of LET and WINDS in order to break the TCP throughput record for satellite links.
Mayumi HIROSE Kenji ISHIDA Nobuyuki TOYODA
GaAs MESFET characteristics in the temperature range of 300 K to 500 K have been investigated using a two-dimensional device simulator. The temperature dependence of the threshold voltage, K-value, subthreshold current, source-to-gate capacitance, and cutoff frequency is theoretically explained.
Kenji ISHIDA Jun'ichi MIYAO Tohru KIKUNO Noriyoshi YOSHIDA
Recently, a real-time communication such as digitizing and packetizing voice, video, and fax has become one of the most important services in large computer networks. However, it is hard to support the real-time communication when a failure occurs in large networks. In this paper, management of a real-time large computer network is discussed concerning the link failure. A reliable cluster-based routing algorithm is proposed. The algorithm, which is an application of a cluster based network management, can keep the real-time communication in case of a link failure. By incorporating both the clusters and the multiple routing modes, the algorithm provides not only a short disconnecting time but also small communication overhead of recovery processing. These advantages of the algorithm are shown by the analysis of average message delay based on Kleinrock's model.
Junichi FUNASAKA Akihiko ISHIZU Kenji ISHIDA
Most P2P systems divide a file into many pieces and fetch different pieces from many peers simultaneously. If one of the last few pieces is requested from an extremely slow peer, the overall download time may become excessive. The end-game mode was proposed to solve this problem. This method requests the last piece from all the connected peers at the same time. Unfortunately, the duplicated requests generate redundant traffic. This paper proposes a requesting method that does not increase overall download time as well as avoiding the redundant traffic. We also propose a combination of our requesting method and the end-game mode. The proposed methods are compared to the existing method with the end-game mode in simulations that use BitTorrent as a typical instance of the parallel retrieving P2P system. The results confirm that our requesting method can match the download times of the end-game mode while suppressing the redundant traffic. Our method enhances network performance by absorbing the difference in peer performance and providing steady download times without wasting traffic resources. Moreover, it is also confirmed that our combination method can distribute a file more quickly than other methods.
Takashi MATSUMOTO Masayuki YAHIRO Kenji ISHIDA Toshihisa HORIUCHI Hirofumi YAMADA Kazumi MATSUSHIGE
We fabricate the organic light-emitting devices (OLEDs), which have dot array structures with organic layer, and discuss the improvement of coupling-out efficiency.
Ryo HAMAMOTO Chisa TAKANO Kenji ISHIDA Masaki AIDA
Mobile ad hoc networks (MANETs) consist of mobile terminals that directly connect with one another to communicate without a network infrastructure, such as base stations and/or access points of wireless local area networks (LANs) connected to wired backbone networks. Large-scale disasters such as tsunamis and earthquakes can cause serious damage to life, property as well as any network infrastructure. However, MANETs can function even after severe disasters have destroyed regular network infrastructure. We have proposed an autonomous decentralized structure formation technology based on local interaction, and have applied it to implement autonomous decentralized clustering on MANETs. This method is known to configure clusters that reflect the network condition, such as residual battery power and the degree of each node. However, the effect of clusters that reflect the network condition has not been evaluated. In this study, we configure clusters using our method, the back-diffusion method, and a bio-inspired method, which is a kind of autonomous decentralized clustering that cannot reflect the network condition. We also clarify the importance of clustering that reflects the network condition, with regard to power consumption and data transfer efficiency.
Ryoma ANDO Ryo HAMAMOTO Hiroyasu OBATA Chisa TAKANO Kenji ISHIDA
In IEEE802.11 Wireless Local Area Networks (WLANs), frame collisions occur drastically when the number of wireless terminals connecting to the same Access Point (AP) increases. It causes the decrease of the total throughput of all terminals. To solve this issue, the authors have proposed a new media access control (MAC) method, Synchronized Phase MAC (SP-MAC), based on the synchronization phenomena of coupled oscillators. We have addressed the network environment in which only uplink flows from the wireless terminal to an AP exist. However, it is necessary to take into consideration of the real network environment in which uplink and downlink flows are generated simultaneously. If many bidirectional data flows exist in the WLAN, the AP receives many frames from both uplink and downlink by collision avoidance of SP-MAC. As a result, the total throughput decreases by buffer overflow in the AP. In this paper, we propose a priority control method based on SP-MAC for avoiding the buffer overflow in the AP under the bidirectional environment. Also, we show that the proposed method has an effect for improving buffer overflow in the AP and total throughput by the simulation.
Masami NAGAOKA Tomotoshi INOUE Katsue KAWAKYU Shuichi OBAYASHI Hiroyuki KAYANO Eiji TAKAGI Yoshikazu TANABE Misao YOSHIMURA Kenji ISHIDA Yoshiaki KITAURA Naotaka UCHITOMI
A monolithic linear power amplifier IC operating with a single low 2.7-V supply has been developed for 1.9-GHz digital mobile communication systems, such as the Japanese personal handy phone system (PHS). Refractory WNx/W self-aligned gate GaAs power MESFETs have been successfully developed for L-band power amplification, and this power amplifier operates with high efficiency and low distortion at a low voltage of 2.7 V, without any additional negative voltage supply, by virtue of small drain knee voltage, high transconductance and sufficient breakdown voltage of the power MESFET. An output power of 23.0 dBm and a high power-added efficiency of 30.8% were attained for 1.9-GHz π/4-shifted QPSK (quadrature phase shift keying) modulated input when adjacent channel leakage power level was less than -60 dBc at 600 kHz apart from 1.9 GHz.
Tomoyuki OHTA Shinji INOUE Yoshiaki KAKUDA Kenji ISHIDA
A clustering scheme for ad hoc networks is aimed at managing a number of mobile devices by utilizing hierarchical structure of the networks. In order to construct and maintain an effective hierarchical structure in ad hoc networks where mobile devices may move at high mobility, the following requirements must be satisfied. (1) The role of each mobile device for the hierarchical structure is adaptive to dynamic change of the topology of the ad hoc networks. The role of each mobile device should thus change autonomously based on local information in each mobile device. (2) The overhead for management of the hierarchical structure is small. The number of mobile devices in each cluster should thus be almost equivalent. This paper proposes an adaptive multihop clustering scheme for highly mobile ad hoc networks. The results obtained by extensive simulation experiments show that the proposed scheme does not depend on mobility and node degree of mobile devices in the network, which satisfy the above requirements.
Atsushi KAMEYAMA Katsue K.KAWAKYU Yoshiko IKEDA Masami NAGAOKA Kenji ISHIDA Tomohiro NITTA Misao YOSHIMURA Yoshiaki KITAURA Naotaka UCHITOMI
A GaAs SPDT switch IC operating at a low power supply voltage of 2.7 V has been developed for use in 1.9 GHz band personal handy phone system (PHS). In combination with MESFETs with low on-resistance and high breakdown voltage, the switch IC adopts parallel-LC resonant circuits and utilizes both stacked FETs and an additional shunt capacitor at the receiver side in order to realize low insertion loss, high isolation and low distortion characteristics. An insertion loss of 0.55 dB and an isolation of 35.8 dB were obtained at 1.9 GHz. The IC also achieved an output power of 25.0 dBm at 1 dB gain compression point, a second order distortion of -54.3 dBc and an adjacent channel leakage power of -66 dBc at 600 kHz apart from 1.9 GHz at 19 dBm output power.
Hiroyasu OBATA Kenji ISHIDA Junichi FUNASAKA Kitsutaro AMANO
Asymmetric networks, which provide asymmetric bandwidth or delay for upstream and downstream transfer, have recently gained much attention since they support popular applications such as the World Wide Web (WWW). HTTP (Hypertext Transfer Protocol) is the basis of most WWW services so, evaluating the performance of HTTP on asymmetric networks is increasingly important, particularly real-world networks. However, the performance of HTTP on the asymmetric networks composed of satellite and terrestrial links has not sufficiently evaluated. This paper proposes new formulas to evaluate the performance of both HTTP1.0 and HTTP1.1 on asymmetric networks. Using these formulas, we calculate the time taken to transfer web data by HTTP1.0/1.1. The calculation results are compared to the results of an existing theoretical formula and experimental results gained from a system that combines a VSAT (Very Small Aperture Terminal) satellite communication system for satellite links (downstream) and the Internet for terrestrial links (upstream). The comparison shows that the proposed formulas yield more accurate results (compared to the measured values) than the existing formula. Furthermore, this paper proposes an evaluation formula for pipelined HTTP1.1, and shows that the values output by the proposed formula agree with those obtained by experiments (on the VSAT system) and simulations.
Kenji ISHIDA Yoshiaki KAKUDA Tohru KIKUNO Kitsutaro AMANO
In this paper we present a distributed routing protocol for finding two node-disjoint paths between each pair of nodes in a computer network. In the proposed protocol, each node in the network has the same procedure, which is driven by local information with respect to the network topology, such as adjacent nodes on a spanning tree in the network. Thus, the execution of the protocol can continue after changes of the network topology and load. Then, a spanning tree-based kernel construction is introduced to synchronize procedures under the distributed control of the protocol. Additionally, the routing scheme based on the protocol possesses the enhanced capabilities of alternate routes and load splitting, which cope with failures and load variations in the network. Thus, even if topology changes damage the obtained disjoint paths, the paths themselves can be updated efficiently.
Kenji ISHIDA Jun'ichi MIYAO Noriyoshi YOSHIDA
We present comparative analysis of average behavior based on path length for hierarchical routing schemes. The analyzed schemes are K-scheme (by Kamoun et al.), G-scheme (by Garcia et al.), and I-scheme (by the authors). The analysis is performed by simulation experiments. The results show that I-scheme is superior to both K- and G-schemes, and that K-scheme is better than G-scheme with respect to path length. Additionally, a path length obtained by I-scheme is about 20% longer than the optimal one on the average.
Junichi FUNASAKA Atsushi KAWANO Kenji ISHIDA
Parallel downloading retrieves different pieces of a file from different servers simultaneously and so is expected to greatly shorten file fetch times. A key requirement is that the different servers must hold the same file. We have already proposed a proxy system that can ensure file freshness and concordance. In this paper, we combine parallel downloading with the proxy server technology in order to download a file quickly and ensure that it is the latest version. Our previous paper on parallel downloading took neither the downloading order of file fragments nor the buffer space requirements into account; this paper corrects those omissions. In order to provide the user with the required file in correct order as a byte stream, the proxy server must reorder the pieces fetched from multiple servers and shuffle in the delayed blocks as soon as possible. Thus, "substitution download" is newly introduced, which requests delayed blocks from other servers to complete downloading earlier. Experiments on substitution download across the Internet clarify the tradeoff between the buffering time and the redundant traffic generated by duplicate requests to multiple servers. As a result, the pseudo-optimum balance is discovered and our method is shown both not to increase downloading time and to limit the buffer space. This network software can be applied to download files smoothly absorbing the difference in performance characteristics among heterogeneous networks.