Hiroyuki HATANO Seiya HORIUCHI Kosuke SANADA Kazuo MORI Takaya YAMAZATO Shintaro ARAI Masato SAITO Yukihiro TADOKORO Hiroya TANAKA
Received Signal Strength Indicator (RSSI)-based localization is of interest in indoor localization systems. In this study, we propose a method to improve localization accuracy using interference-oriented fluctuation. We estimate the distance between target and beacon nodes by utilizing the nodes located around them. When the beacon node transmits a signal to the target for measuring the distance, the surrounding nodes also transmit a copy of the signal. Such signals cause interference patterns at the beacon, thereby randomizing the RSSI. Our developed statistical signal processing enables the estimation of the strength of the received signal with the randomized RSSI. We numerically show that the distance between the target and beacon nodes is estimated with lower error than when using the conventional method. In addition, such accurate distance estimation allows significant improvement in localization performance. Our approach is useful for indoor localization systems, for example, those in medical and industrial applications.
Daisuke ISHII Takanori HARA Kenichi HIGUCHI
In this paper, we investigate a method for clustering user equipment (UE)-specific transmission access points (APs) in downlink cell-free multiple-input multiple-output (MIMO) assuming that the APs distributed over the system coverage know only part of the instantaneous channel state information (CSI). As a beamforming (BF) method based on partial CSI, we use a layered partially non-orthogonal zero-forcing (ZF) method based on channel matrix muting, which is applicable to the case where different transmitting AP groups are selected for each UE under partial CSI conditions. We propose two AP clustering methods. Both proposed methods first tentatively determine the transmitting APs independently for each UE and then iteratively update the transmitting APs for each UE based on the estimated throughput considering the interference among the UEs. One of the two proposed methods introduces a UE cluster for each UE into the iterative updates of the transmitting APs to balance throughput performance and scalability. Computer simulations show that the proposed methods achieve higher geometric-mean and worst user throughput than those for the conventional methods.
Ryota KOBAYASHI Takanori HARA Yasuaki YUDA Kenichi HIGUCHI
This paper extends our previously reported non-orthogonal multiple access (NOMA)-based highly-efficient and low-latency hybrid automatic repeat request (HARQ) method for ultra-reliable low latency communications (URLLC) to the case with inter-base station cooperation. In the proposed method, delay-sensitive URLLC packets are preferentially multiplexed with best-effort enhanced mobile broadband (eMBB) packets in the same channel using superposition coding to reduce the transmission latency of the URLLC packet while alleviating the throughput loss in eMBB. Although data transmission to the URLLC terminal is conducted by multiple base stations based on inter-base station cooperation, the proposed method allocates radio resources to URLLC terminals which include scheduling (bandwidth allocation) and power allocation at each base station independently to achieve the short transmission latency required for URLLC. To avoid excessive radio resource assignment to URLLC terminals due to independent resource assignment at each base station, which may result in throughput degradation in eMBB terminals, we employ an adaptive path-loss-dependent weighting approach in the scheduling-metric calculation. This achieves appropriate radio resource assignment to URLLC terminals while reducing the packet error rate (PER) and transmission delay time thanks to the inter-base station cooperation. We show that the proposed method significantly improves the overall performance of the system that provides simultaneous eMBB and URLLC services.
Kengo TAJIRI Ryoichi KAWAHARA Yoichi MATSUO
Machine learning (ML) has been used for various tasks in network operations in recent years. However, since the scale of networks has grown and the amount of data generated has increased, it has been increasingly difficult for network operators to conduct their tasks with a single server using ML. Thus, ML with edge-cloud cooperation has been attracting attention for efficiently processing and analyzing a large amount of data. In the edge-cloud cooperation setting, although transmission latency, bandwidth congestion, and accuracy of tasks using ML depend on the load balance of processing data with edge servers and a cloud server in edge-cloud cooperation, the relationship is too complex to estimate. In this paper, we focus on monitoring anomalous traffic as an example of ML tasks for network operations and formulate transmission latency, bandwidth congestion, and the accuracy of the task with edge-cloud cooperation considering the ratio of the amount of data preprocessed in edge servers to that in a cloud server. Moreover, we formulate an optimization problem under constraints for transmission latency and bandwidth congestion to select the proper ratio by using our formulation. By solving our optimization problem, the optimal load balance between edge servers and a cloud server can be selected, and the accuracy of anomalous traffic monitoring can be estimated. Our formulation and optimization framework can be used for other ML tasks by considering the generating distribution of data and the type of an ML model. In accordance with our formulation, we simulated the optimal load balance of edge-cloud cooperation in a topology that mimicked a Japanese network and conducted an anomalous traffic detection experiment by using real traffic data to compare the estimated accuracy based on our formulation and the actual accuracy based on the experiment.
Katsuhiko ISHIKAWA Taro MURAKAMI Mikiya TANIGUCHI
This study examined whether distance learning in a first-year PBL courses in the first unit of instruction improves the effectiveness of subsequent group work learning over face-to-face learning. The first-year PBL consisted of three units: an input unit, a group work unit and an outcomes presentation unit. In 2017/2018, the input unit was conducted in the classroom with face-to-face learning. In 2017, a workshop was held in addition to face-to-face learning in classroom. In 2020/2021, the input unit was conducted with distance learning. In the years, approximately 100 people completed the questionnaire. A preliminary check confirmed that the average score of students' self-assessment of their own social skills were not significantly different among the four years. Analysis showed that in 2018, the perceived efficacy in the group work unit depended on learners' high social skills. Alternatively, in 2017/2020/2021, the perceived efficacy in group work was not dependent on learners' social skills. This suggests that distance learning and face-to-face learning with workshop learning, instead of full face-to-face learning for the units placed before the group work unit facilitates the learning efficacy of the group work unit, even for students with social skill concerns.
Tatsuki OKUYAMA Nobuhide NONAKA Satoshi SUYAMA Yukihiko OKUMURA Takahiro ASAI
The fifth-generation (5G) mobile communications system initially introduced massive multiple-input multiple-output (M-MIMO) with analog beamforming (BF) to compensate for the larger path-loss in millimeter-wave (mmW) bands. To solve a coverage issue and support high mobility of the mmW bands, base station (BS) cooperation technologies have been investigated in high-mobility environments. However, previous works assume one mobile station (MS) scenario and analog BF that does not suppress interference among MSs. In order to improve system performance in the mmW bands, fully digital BF that includes digital precoding should be employed to suppress the interference even when MSs travel in high mobility. This paper proposes two mmW BS cooperation technologies that are inter-baseband unit (inter-BBU) and intra-BBU cooperation for the fully digital BF. The inter-BBU cooperation exploits two M-MIMO antennas in two BBUs connected to one central unit by limited-bandwidth fronthaul, and the intra-BBU cooperates two M-MIMO antennas connected to one BBU with Doppler frequency shift compensation. This paper verifies effectiveness of the BS cooperation technologies by both computer simulations and outdoor experimental trials. First, it is shown that that the intra-BBU cooperation can achieve an excellent transmission performance in cases of two and four MSs moving at a velocity of 90km/h by computer simulations. Second, the outdoor experimental trials clarifies that the inter-BBU cooperation maintains the maximum throughput in a wider area than non-BS cooperation when only one MS moves at a maximum velocity of 120km/h.
Toshiki TSUCHIDA Makoto TAKITA Yoshiaki SHIRAISHI Masami MOHRI Yasuhiro TAKANO Masakatu MORII
In the context of Cyber-Physical System (CPS), analyzing the real world data accumulated in cyberspace would improve the efficiency and productivity of various social systems. Towards establishing data-driven society, it is desired to share data safely and smoothly among multiple services. In this paper, we propose a scheme that services authenticate users using information registered on a blockchain. We show that the proposed scheme has resistance to tampering and a spoofing attack.
Yosuke TANIGAWA Seiya DEJIMA Hideki TODE
Recently, ZigBee has been attracting attention as a low-power and short-range wireless communication standard. In ZigBee networks, it is necessary to suppress frame transfer load because ZigBee needs to operate within severe capacity constraints and with low power consumption. However, in the typical environments in which ZigBee is used, such as smart home networks, WLAN (Wireless LAN) generally coexists, and radio interference occurs between the two networks. Existing studies focused on only interference avoidance. On the other hand, in this paper, we focus on adaptive cooperation between ZigBee network and WLAN. Specifically, from the viewpoints of WLANs that have wider communication range but have many idle periods in some environments like homes, we propose and study a hop count reduction method of ZigBee frame transfer by partially employing WLAN communication to transfer ZigBee frames. To the best of our knowledge, this is the first paper that considers the adaptive cooperation between ZigBee network and WLAN, where some ZigBee frames are transferred via WLAN to the sink. This is a completely new approach different from existing interference avoidance approaches. Then, we evaluate the hop count reduction by considering the number and the positions of relay points to transfer ZigBee frames to WLAN, and ZigBee tree topology for frame transfer routes. Through the evaluation, two realistic deployment policies of the relay points are derived. Finally, as specific advantages from the hop count reduction, we demonstrate the performance improvement about sink arrival ratio and end-to-end transfer delay of ZigBee frames, and energy consumption.
Ou ZHAO Lin SHAN Wei-Shun LIAO Mirza GOLAM KIBRIA Huan-Bang LI Kentaro ISHIZU Fumihide KOJIMA
Large-scale distributed antenna systems (LS-DASs) are gaining increasing interest and emerging as highly promising candidates for future wireless communications. To improve the user's quality of service (QoS) in these systems, this study proposes a user cooperation aided clustering approach based on device-centric architectures; it enables multi-user multiple-input multiple-output transmissions with non-reciprocal setups. We actively use device-to-device communication techniques to achieve the sharing of user information and try to form clusters on user side instead of the traditional way that performs clustering on base station (BS) side in data offloading. We further adopt a device-centric architecture to break the limits of the classical BS-centric cellular structure. Moreover, we derive an approximate expression to calculate the user rate for LS-DASs with employment of zero-forcing precoding and consideration of inter-cluster interference. Numerical results indicate that the approximate expression predicts the user rate with a lower computational cost than is indicated by computer simulation, and the proposed approach provides better user experience for, in particular, the users who have unacceptable QoS.
Performance of network coded cooperation over the Gaussian channel in which multiple communication nodes send each one's message to a common destination is analyzed. The nodes first broadcast the message, and subsequently relay the XOR of subset of decoded messages to the destination. The received vector at the destination can be equivalently regarded as the output of a point-to-point channel, except that the underlying codes are drawn probabilistically and symbol errors may occur before transmission of a codeword. We analyze the error performance of this system from coding theoretic viewpoint.
Sangwoo PARK Iickho SONG Seungwon LEE Seokho YOON
We propose a cooperative cognitive radio network (CCRN) with secondary users (SUs) employing two simultaneous transmit and receive (STAR) antennas. In the proposed framework of full-duplex (FD) multiple-input-multiple-output (MIMO) CCRN, the region of achievable rate is expanded via FD communication among SUs enabled by the STAR antennas adopted for the SUs. The link capacity of the proposed framework is analyzed theoretically. It is shown through numerical analysis that the proposed FD MIMO-CCRN framework can provide a considerable performance gain over the conventional frameworks of CCRN and MIMO-CCRN.
Shohei KAMAMURA Aki FUKUDA Hiroki MORI Rie HAYASHI Yoshihiko UEMATSU
By focusing on the recent swing to the centralized approach by the software defined network (SDN), this paper presents a novel network architecture for refactoring the current distributed Internet protocol (IP) by not only utilizing the SDN itself but also implementing its cooperation with the optical transport layer. The first IP refactoring is for flexible network topology reconfiguration: the global routing and explicit routing functions are transferred from the distributed routers to the centralized SDN. The second IP refactoring is for cost-efficient maintenance migration: we introduce a resource portable IP router that can behave as a shared backup router by cooperating with the optical transport path switching. Extensive evaluations show that our architecture makes the current IP network easier to configure and more scalable. We also validate the feasibility of our proposal.
Wenbo XU Yifan WANG Yibing GAI Siye WANG Jiaru LIN
The theory of compressed sensing (CS) is very attractive in that it makes it possible to reconstruct sparse signals with sub-Nyquist sampling rates. Considering that CS can be regarded as a joint source-channel code, it has been recently applied in communication systems and shown great potential. This paper studies compressed cooperation in an amplify-and-forward (CC-AF) relay channel. By discussing whether the source transmits the same messages in two phases, and the different cases of the measurement matrices used at the source and the relay, four decoding strategies are proposed and their transmission rates are analyzed theoretically. With the derived rates, we show by numerical simulations that CC-AF outperforms the direct compressed transmission without relay. In addition, the performance of CC-AF and the existing compressed cooperation with decode-and-forward relay is also compared.
Surapol TAN-A-RAM Watit BENJAPOLAKUL
In this paper, we propose to use a strategy for the two-user Gaussian X channel with limited receiver cooperation in the general case consisting of two parts: 1) the transmission scheme where the superposition coding is used and 2) the cooperative protocol where the two-round strategy based on quantize-map-and-forward (QMF) is employed. We image that a Gaussian X channel can be considered as a superposition of two Gaussian interference channels based on grouping of the sent messages from each transmitter to the corresponding receivers. Finally, we give an achievable rate region for the general case of this channel.
Aromhack SAYSANASONGKHAM Satoshi FUKUMOTO
In this research, we investigated the reliability of a 1-out-of-2 system with two-stage repair comprising hardware restoration and data reconstruction modes. Hardware restoration is normally independently executed by two modules. In contrast, we assumed that one of the modules could omit data reconstruction by replicating the data from the module during normal operation. In this 1-out-of-2 system, the two modules mutually cooperated in the recovery mode. As a first step, an evaluation model using Markov chains was constructed to derive a reliability measure: “unavailability in steady state.” Numerical examples confirmed that the reliability of the system was improved by the use of two cooperating modules. As the data reconstruction time increased, the gains in terms of system reliability also increased.
Nobuhide NONAKA Anass BENJEBBOUR Kenichi HIGUCHI
This paper proposes applying random (opportunistic) beamforming to base station (BS) cooperative multiuser multiple-input multiple-output (MIMO) transmission. This proposal comprises two parts. First, we propose a block-diagonalized random unitary beamforming matrix. The proposed beamforming matrix achieves better throughput distribution compared to the purely random unitary beamforming matrix when the average path loss determined by distance-dependent loss and shadowing loss is largely different among transmitter antennas, which is true in BS cooperative MIMO. Second, we propose an online update algorithm for a random beamforming matrix to improve the throughput compared to the purely random and channel-independent beamforming matrix generation, especially when the number of users is low. Different from conventional approaches, the proposed online update algorithm does not increase the overhead of the reference signal transmission and control delay. Simulation results show the effectiveness of the proposed method using a block-diagonalized random unitary beamforming matrix with online updates in a BS cooperative multiuser MIMO scenario.
Nobuhide NONAKA Yoshihisa KISHIYAMA Kenichi HIGUCHI
This paper extends our previously proposed non-orthogonal multiple access (NOMA) scheme to the base station (BS) cooperative multiple-input multiple-output (MIMO) cellular downlink for future radio access. The proposed NOMA scheme employs intra-beam superposition coding of a multiuser signal at the transmitter and the spatial filtering of inter-beam interference followed by the intra-beam successive interference canceller (SIC) at the user terminal receiver. The intra-beam SIC cancels out the inter-user interference within a beam. This configuration achieves reduced overhead for the downlink reference signaling for channel estimation at the user terminal in the case of non-orthogonal user multiplexing and enables the use of the SIC receiver in the MIMO downlink. The transmitter beamforming (precoding) matrix is controlled based on open loop-type random beamforming using a block-diagonalized beamforming matrix, which is very efficient in terms of the amount of feedback information from the user terminal. Simulation results show that the proposed NOMA scheme with block-diagonalized random beamforming in BS cooperative multiuser MIMO and the intra-beam SIC achieves better system-level throughput than orthogonal multiple access (OMA), which is assumed in LTE-Advanced. We also show that BS cooperative operation along with the proposed NOMA further enhances the cell-edge user throughput gain which implies better user fairness and universal connectivity.
Amin JAMALI Mehdi BERENJKOUB Hossein SAIDI
Autonomous ad hoc networks are networks with nodes belonging to different authorities, and cooperative behavior of nodes is not guaranteed in such networks. In this paper, defense mechanisms are introduced to protect nodes against injecting traffic attacks in an autonomous ad hoc network, and to stimulate nodes to forward packets for each other. We have a cross-layer approach in the design of our mechanisms, and nodes use information from medium access control (MAC) layer for selecting a good route. In addition, nodes attempt to drop packets of those nodes that violate MAC layer backoff mechanism. Analytical and simulation results demonstrate the effectiveness of our proposed mechanisms in the presence of injecting traffic attacks and MAC layer misbehaviors in an ad hoc network that consists of selfish nodes.
Naoki MIURA Akihiko MIYAZAKI Junichi KATO Nobuyuki TANAKA Satoshi SHIGEMATSU Masami URANO Mamoru NAKANISHI Tsugumichi SHIBATA
A 10-gigabit Ethernet passive optical network (10G-EPON) is promising for the next generation of access networks. A protocol processor for 10G-EPON needs to not only achieve 10-Gbps throughput but also to have protocol extendibility for various potential services. However, the conventional protocol processor does not have the ability to install additional protocols after chip fabrication, due to its hardware-based architecture. This paper presents a software-hardware cooperative protocol processor for 10G-EPON that provides the protocol extendibility. To achieve the software-hardware cooperation, the protocol processor newly employs a software-hardware partitioning technique driven by the timing requirements of 10G-EPON and a software-hardware interface circuit with event FIFO to absorb performance difference between software and hardware. The fabricated chip with this protocol processor properly works cooperatively and is able to accept newly standardized protocols. This protocol processor enables network operators to install additional service protocols adaptively for their own services.
Fumio TERAOKA Sho KANEMARU Kazuma YONEMURA Motoki IDE Shinji KAWAGUCHI Kunitake KANEKO
Using “clean-slate approach” to redesign the Internet has attracted considerable attention. ZNA (Z Network Architecture) is one of clean-slate network architectures based on the layered model. The major features of ZNA are as follows: (1) introducing the session layer to provide the applications with sophisticated communication services, (2) employing inter-node cross-layer cooperation to adapt to the dynamically changing network conditions, (3) splitting the node identifier and the node locator for mobility, multi-homing, and heterogeneity of network layer protocols, (4) splitting the data plane and the control plane for high manageability, and (5) introducing a recursive layered model to support network virtualization. This paper focuses on the first three topics as well as the basic design of ZNA.