Satoshi OHZAHATA

Department of InformaticsProfessor
Cluster II (Emerging Multi-interdisciplinary Engineering)Professor
Meta-Networking Research CenterProfessor
  • Profile:
    Mobile Internet
    Wireless Internet
    Ad hoc network
    Overlay network

Degree

  • 学士(理学), 筑波大学
  • 修士(工学), 筑波大学
  • 博士(工学), 筑波大学

Research Keyword

  • Performance evaluation
  • Overlay/P2P network
  • Wireless/Mobile network
  • Internet
  • Computer network
  • 通信性能評価
  • P2Pネットワーク
  • オーバレイ
  • モバイルネットワーク
  • 無線
  • インターネット
  • コンピュータネットワーク

Field Of Study

  • Informatics, Information networks

Career

  • Apr. 2016 - Mar. 2023
    The University of Electro-Communications, Graduate School of Informatics and Engineering Department of Informatics, Associate Professor
  • Apr. 2009 - Mar. 2016
    The University of Electro-Communications, Graduate School of Information Systems Department of Information Network Systems, Associate Professor, Japan
  • 01 Apr. 2007 - 31 Mar. 2009
    東京農工大学大学院共生科学技術研究院, 助教
  • 01 Apr. 2003 - 31 Mar. 2007
    東京農工大学 工学部 情報コミュニケーション工学科, 助手

Educational Background

  • Apr. 1998 - Mar. 2003
    University of Tsukuba, 博士課程 工学研究科, 電子・情報工学専攻
  • Apr. 1993 - Mar. 1998
    University of Tsukuba, 第一学群 自然学類, 物理学専攻
  • 01 Apr. 1990 - 31 Mar. 1993
    千葉県立佐倉高等学校

Member History

  • Jun. 2021 - May 2023
    通信ソサイエティ 研専運営会議 総務幹事, 電子情報通信学会, Society
  • 01 Jun. 2018 - 31 May 2020
    編集副委員長, 電子情報通信学会 英文論文誌B
  • 01 Jun. 2014 - 31 May 2018
    編集委員, 電子情報通信学会 英文論文誌B
  • 01 Apr. 2015 - 31 Mar. 2017
    教科科目第一委員会委員, 独立行政法人大学入試センター
  • Jun. 2012 - May 2014
    通信ソサイエティ 会員事業企画幹事, IEICE, Society
  • Jun. 2010 - May 2012
    通信ソサイエティ アドホックネットワーク研究専門委員会 幹事, IEICE, Society

Award

  • Sep. 2023
    電子情報通信学会 通信ソサイエティ
    活動功労賞
  • Sep. 2020
    電子情報通信学会 通信ソサイエティ
    「英文論文誌編集副委員長としての貢献」
    活動功労賞
  • Sep. 2018
    電子情報通信学会通信ソサイエティ
    活動功労賞
  • Sep. 2015
    電子情報通信学会 通信ソサイエティ
    活動功労賞
  • Sep. 2014
    電子情報通信学会通信ソサイエティ
    活動功労賞
  • Sep. 2010
    電子情報通信学会 通信ソサイエティ
    活動功労賞
  • Mar. 2008
    電子情報通信学会
    ネットワークシステム研究賞
  • Mar. 2005
    電子情報通信学会
    学術奨励賞

Paper

  • DFTIMP: Distributed Fake Traffic Injection from Multiple Points for Obfuscation of IoT Traffic
    Ken Sasaki; Ryo Yamamoto; Satoshi Ohzahata
    2025 IEEE International Conference on Consumer Electronics (ICCE), IEEE, 1-4, 11 Jan. 2025
    International conference proceedings
  • TCP Pacing Without Clock-Based Timing Control for Data Segment Transmission
    Toshihiko Kato; Ryo Yamamoto; Satoshi Ohzahata
    2024 10th International Conference on Computer and Communications (ICCC), IEEE, 2495-2499, 13 Dec. 2024
    International conference proceedings
  • SRv6-based Route Shortening for Optimizing Communication Resources in Multi-homed Environments
    Takeshi Goto; Ryo Yamamoto; Satoshi Ohzahata
    2024 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan), IEEE, 593-594, 09 Jul. 2024
    International conference proceedings
  • Experimental Study on The Effect of Time Synchronization Errors in VANET
    Shoma Makimori; Ryo Yamamoto; Satoshi Ohzahata
    2024 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan), IEEE, 517-518, 09 Jul. 2024
    International conference proceedings
  • Preliminary Study of Data Augmentation for Video QoE Evaluation
    Takeru Horita; Ryo Yamamoto; Satoshi Ohzahata
    2024 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan), IEEE, 753-754, 09 Jul. 2024
    International conference proceedings
  • IDAC: Federated Learning-Based Intrusion Detection Using Autonomously Extracted Anomalies in IoT
    Takahiro Ohtani; Ryo Yamamoto; Satoshi Ohzahata
    Sensors, MDPI AG, 24, 10, 3218-3218, 18 May 2024, The recent rapid growth in Internet of Things (IoT) technologies is enriching our daily lives but significant information security risks in IoT fields have become apparent. In fact, there have been large-scale botnet attacks that exploit undiscovered vulnerabilities, known as zero-day attacks. Several intrusion detection methods based on network traffic monitoring have been proposed to address this issue. These methods employ federated learning to share learned attack information among multiple IoT networks, aiming to improve collective detection capabilities against attacks including zero-day attacks. Although their ability to detect zero-day attacks with high precision has been confirmed, challenges such as autonomous labeling of attacks from traffic information and attack information sharing between different device types still remain. To resolve the issues, this paper proposes IDAC, a novel intrusion detection method with autonomous attack candidate labeling and federated learning-based attack candidate sharing. The labeling of attack candidates in IDAC is executed using information autonomously extracted from traffic information, and the labeling can also be applied to zero-day attacks. The federated learning-based attack candidate sharing enables candidate aggregation from multiple networks, and it executes attack determination based on the aggregated similar candidates. Performance evaluations demonstrated that IDS with IDAC within networks based on attack candidates is feasible and achieved comparable detection performance against multiple attacks including zero-day attacks compared to the existing methods while suppressing false positives in the extraction of attack candidates. In addition, the sharing of autonomously extracted attack candidates from multiple networks improves both detection performance and the required time for attack detection.
    Scientific journal
  • Auto Annotation using Object Tracking with Multiple in-vehicle Cameras for Federated Learning
    Yuuki Nakahama; Satoshi Ohzahata; Ryo Yamamoto
    2024 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), IEEE, 19 Feb. 2024
    International conference proceedings
  • Deep Learning-Based No-Reference Video Streaming QoE Estimation Using WebRTC Statistics
    Keisuke Sakakibara; Satoshi Ohzahata; Ryo Yamamoto
    2024 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), IEEE, 19 Feb. 2024
    International conference proceedings
  • A Visual-Identification based Forwarding Strategy with Road Junction in Vehicular Named Data Networking
    Minh Ngo; Satoshi Ohzahata; Ryo Yamamoto
    International Conference on Information Networking, 62-67, 2024
    International conference proceedings
  • Detecting Zero-day Attack with Federated Learning using Autonomously Extracted Anomalies in IoT
    Takahiro Ohtani; Ryo Yamamoto; Satoshi Ohzahata
    CCNC 2024, Jan. 2024, Peer-reviwed
    International conference proceedings
  • Accelerating Feedback Control for QoE Fairness in Adaptive Video Streaming over ICN
    Rei Nakagawa; Satoshi Ohzahata; Ryo Yamamoto
    CCNC 2024, Jan. 2024, Peer-reviwed
    International conference proceedings
  • VORTEX: Network-Driven Opportunistic Routing for Ad Hoc Networks
    Ryo Yamamoto; Taku Yamazaki; Satoshi Ohzahata
    Sensors, MDPI AG, 23, 6, 2893-2893, 07 Mar. 2023, Peer-reviwed, The potential of ad hoc networks, which enable flexible and dynamic network establishment only by mobile terminals equipped with wireless communication devices, has recently attracted attention for the coming IoT era. Although the nature of ad hoc networks shows the advantages of their autonomous and distributed network management, a manifestation of drawbacks owing to the nature of wireless communication and the mobility of terminals are inevitable. Many routing protocols have already been proposed to address the issues by adapting to nature and achieving a certain level of improvement. However, the routing protocols still suffer from difficulties in information collection for routing and adaptive route management during communication. Moreover, there is another issue that end pair-based routing procedures prevent other end pairs from reusing the routing information effectively. To address the drawbacks of conventional routing protocols, this paper proposes VORTEX, a novel routing protocol that employs an opportunistic routing strategy using hierarchization. One of the characteristic features of VORTEX is its network-driven opportunistic forwarding, in which packets travel toward destination terminals using hierarchy as a guide without conventional route discovery procedures. Moreover, another characteristic feature of VORTEX is that the hierarchical structure also contributes to adapting to communication environment changes in an autonomous manner. In other words, VORTEX enables flexible network-wide information-based routing only with the locally collected information. The simulation results show that the proposed VORTEX could provide better service quality and reliability with improved efficiency compared to the conventional routing protocols. Furthermore, the most significant contribution is not only in the communication performance but also VORTEX omits route discovery or route maintenance from routing protocols, and formed networks themselves have a function to deliver packets toward destination terminals.
    Scientific journal
  • A Visual-Identification Based Forwarding Strategy for Vehicular Named Data Networking
    Minh NGO; Satoshi OHZAHATA; Ryo YAMAMOTO; Toshihiko KATO
    IEICE Transactions on Information and Systems, Institute of Electronics, Information and Communications Engineers (IEICE), E106.D, 2, 204-217, 01 Feb. 2023, Peer-reviwed
    Scientific journal
  • Active Intrusion Detection with Periodical Probing for IoT Devices
    Ryo Yamamoto; Takahiro Ohtani; Satoshi Ohzahata
    2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), IEEE, 08 Jan. 2023, Peer-reviwed
    International conference proceedings
  • Improving Fairness for QoE of Adaptive Video Streaming over ICN
    Rei Nakagawa; Satoshi Ohzahata; Ryo Yamamoto
    2022 IEEE 11th International Conference on Cloud Networking (CloudNet), IEEE, 07 Nov. 2022, Peer-reviwed
    International conference proceedings
  • VNE-HAGBE: A Hybrid Approach to Improve VNR Request Acceptance Rate for Wireless Virtual Network Embedding
    Raihaanjun Kushiyama; Ryo Yamamoto; Satoshi Ohzahata
    2022 23rd Asia-Pacific Network Operations and Management Symposium (APNOMS), IEEE, 28 Sep. 2022, Peer-reviwed
    International conference proceedings
  • A Link State Routing Method for CCN with Blockchain
    Shuichi Tokunaga; Satoshi Ohzahata; Ryo Yamamoto
    ASON 2021, 7 pages, 27 Nov. 2021, Peer-reviwed
    International conference proceedings, English
  • A novel visual-identification based forwarding strategy for Vehicular Named Data Networking
    Minh Ngo; Satoshi Ohzahata; Ryo Yamamoto; Toshihiko Kato
    EAI MONAMI 2021, 6 pages, 27 Oct. 2021, Peer-reviwed
    International conference proceedings, English
  • Mitigating Congestion with Explicit Cache Placement Notification for Adaptive Video Streaming over ICN
    Rei NAKAGAWA; Satoshi OHZAHATA; Ryo YAMAMOTO; Toshihiko KATO
    IEICE ED, E104.D, 9, 1406-1419, 01 Sep. 2021, Peer-reviwed
    Scientific journal, English
  • A Congestion-Aware Adaptive Streaming over ICN combined with Explicit Congestion Notification for QoE Improvement
    R. Nakagawa; S. Ohzahata; R. Yamamoto; T. Kato
    IEICE ED, E104.D, 2, 264-274, 2021, Peer-reviwed
    Scientific journal, English
  • How Coarse-grained Clock Impacts on Performance of NDN Rate-based Congestion Control with Explicit Rate Reporting
    Toshihiko Kato; Takumi Enda; Ryo Yamamoto; Satoshi Ohzahata
    Proceedings of the 2020 Federated Conference on Computer Science and Information Systems, FedCSIS 2020, Institute of Electrical and Electronics Engineers Inc., 479-488, 01 Sep. 2020
    International conference proceedings, English
  • A Content Registration Method for CCN Routers with Blockchain
    S. Tokunaga; R. Nakagawa; S. Ohzahata; R. Yamamoto; T. Kato
    Proc. of IEEE ICCE-TW, 2 pages, Sep. 2020, Peer-reviwed
    International conference proceedings, English
  • A study on performance of explicit rate report based congestion control under coarse-grained clock management
    Toshihiko Kato; Takumi Enda; Ryo Yamamoto; Satoshi Ohzahata
    ICETE 2020 - Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, SciTePress, 82-88, 2020
    International conference proceedings, English
  • mpCUBIC: A CUBIC-like congestion control algorithm for multipath TCP
    Toshihiko Kato; Shiho Haruyama; Ryo Yamamoto; Satoshi Ohzahata
    Advances in Intelligent Systems and Computing, Springer, 1160, 306-317, 2020
    International conference proceedings, English
  • A Container-based Content Delivery Method for Edge Cloud over Wide Area Network
    K. Nakanishi; F. Suzuki; S. Ohzahata; R. Yamamoto; T. Kato
    Proc. of International Conference on Information Networking (ICOIN) 2020, 568-573, Jan. 2020, Peer-reviwed
    International conference proceedings, English
  • モバイル環境における通信品質指標を用いた機械学習によるWeb転送遅延判定方式
    小林 史弥; 川口 銀河; 岡本 淳; 大坐畠 智; 小川 秀貴; 高橋 玲
    電子情報通信学会 和文論文誌B, J103-B, 6, 210-222, 2020, Peer-reviwed
    Scientific journal, Japanese
  • Throughput enhancement with overlay network virtualization using commodity devices
    Hiroki Kawahara; Ryo Yamamoto; Satoshi Ohzahata; Toshihiko Kato
    UCC 2019 Companion - Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing, Association for Computing Machinery, Inc, 147-148, 02 Dec. 2019
    International conference proceedings, English
  • A congestion avoidance for adaptive streaming over ICN using bitrate feedback from in-network nodes
    Rei Nakagawa; Satoshi Ohzahata; Ryo Yamamoto; Toshihiko Kato
    ASON 2019, **-**, Nov. 2019, Peer-reviwed
    International conference proceedings, English
  • Performance Evaluation of MANET Based on Named Data Networking Using Hybrid Routing Mechanism
    Quang Minh Ngo; Ryo Yamamoto; Satoshi Ohzahata; Toshihiko Kato
    Journal of Communications, 14, 9, 819-825, Sep. 2019, Peer-reviwed
    Scientific journal, English
  • Proposal and Performance Evaluation of Hybrid Routing Mechanism for NDN Ad Hoc Networks Combining Proactive and Reactive Approaches
    Quang Minh Ngo; Ryo Yamamoto; Satoshi Ohzahata; Toshihiko Kato
    IEICE Transactions on Information and Systems, E102-D, 9, 1784-1796, Sep. 2019, Peer-reviwed
    Scientific journal, English
  • Applying SMOTE for a Sequential Classifiers Combination Method to Improve the Performance of Intrusion Detection System
    Sornxayya Phetlasy; Satoshi Ohzahata; Celimuge Wu; Toshihito Kato
    IEEE CyberSciTech 2019, **-**, Aug. 2019, Peer-reviwed
    International conference proceedings, English
  • EXPERIMENTAL ANALYSIS OF MPTCP CONGESTION CONTROL ALGORITHMS; LIA, OLIA AND BALIA
    Toshihiko Kato; Adhikari Diwakar; Ryo Yamamoto; Satoshi Ohzahata; Nobuo Suzuki
    Proceedings of the International Conferences Big Data Analytics, Data Mining and Computational Intelligence 2019; and Theory and Practice in Modern Computing 2019, IADIS Press, 16 Jul. 2019
    International conference proceedings
  • A dynamic cache size assignment method with bandwidth reservation for ccn
    Atsuko Yokotani; Satoshi Ohzahata; Ryo Yamamoto; Toshihiko Kato
    International Conference on Information Networking, IEEE Computer Society, 2019-, 430-435, 17 May 2019
    International conference proceedings, English
  • An Efficient Dynamic Bandwidth Reservation Method in Content-Centric Network
    Fumiya Suzuki; Satoshi Ohzahata; Ryo Yamamoto; Toshihiko Kato
    IEEE International Conference on Consumer Electronics -Taiwan (ICCE-TW) 2019, 2 pages, May 2019, Peer-reviwed
    International conference proceedings, English
  • Opportunistic Routing for Heterogeneous IoT Networks
    Fumiya Suzuki; Satoshi Ohzahata; Ryo Yamamoto; Toshihiko Kato
    IEEE International Conference on Consumer Electronics -Taiwan (ICCE-TW) 2019, 2 pages, May 2019, Peer-reviwed
    International conference proceedings, English
  • Analysis of Performance Degradation of TCP Reno over WLAN Caused by Access Point Scanning
    Toshihiko Kato; Sota Tasaki; Ryo Yamamoto; Satoshi Ohzahata
    World Conference on Information Systems and Technologies (WorldCIST’19), 385-395, Apr. 2019, Peer-reviwed
    International conference proceedings, English
  • Estimating TCP Congestion Control Algorithms from Passively Collected Packet Traces using Recurrent Neural Network
    Naoki Ohzeki; Ryo Yamamoto; Satoshi Ohzahata; Toshihiko Kato
    Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, SCITEPRESS - Science and Technology Publications, 2019
    International conference proceedings
  • Impacts of System Clock Granularity on Performance of NDN Rate-based Congestion Control
    Toshihiko Kato; Kazuki Osada; Ryo Yamamoto; Satoshi Ohzahata
    International Journal On Advances in Telecommunications, 11, 3&4, 135-143, Jan. 2019, Peer-reviwed
    Scientific journal, English
  • 輻輳ウィンドウとその増加分に着目したパッシブなTCP輻輳制御アルゴリズムの推定方法
    加藤聰彦; 小田 淳; Xiaofan Ya; 山本 嶺; 大坐畠智
    情報処理学会 論文誌, 60, 2, 479-490, 2019, Peer-reviwed
    Scientific journal, Japanese
  • A Sequential Classifiers Combination Method to Reduce False Negative for Intrusion Detection System
    Sornxayya Phetlasy; Satoshi Ohzahata; Celimuge Wu; Toshihito Kato
    IEICE Transactions on Information and Systems, 102, 5, 888-897, 2019, Peer-reviwed
    Scientific journal, English
  • A Traffic Distribution System Among Multiple Terminals Using MPTCP in Multihomed Network Environment
    R. Asakura; R. Horigome; N. Yamai; N. Kitagawa; S. Ohzahata
    IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC) 2019 workshop SRS, 900-903, 2019, Peer-reviwed
    International conference proceedings, English
  • Performance Evaluation of TCP Spurious Timeout Detection Methods Under Delay Spike and Packet Loss Emulating LTE Handover
    Toshihiko Kato; Masahito Moriyama; Ryo Yamamoto; Satoshi Ohzahata
    IADIS International Journal on Computer Science and Information Systems, 13, 2, 16-29, Dec. 2018, Peer-reviwed
    Scientific journal, English
  • How to Implement NDN MANET over ndnSIM Simulator
    Toshihiko Kato; Ngo Quang Minh; Ryo Yamamoto; Satoshi Ohzahata
    IEEE 4th International Conference on Computer and Communications 2018, 451-456, Dec. 2018, Peer-reviwed
    International conference proceedings, English
  • IEEE802.11ac無線LANのMU-MIMOダウンリンク伝送における動的フレームアグリゲーションサイズ選択によるスループット改善手法
    森山友和; 山本 嶺; 大坐畠 智; 加藤聰彦
    電子情報通信学会 和文論文誌B, 電子情報通信学会, J101-B, No.7, 558-569, 01 Jul. 2018, Peer-reviwed
    Scientific journal, Japanese
  • Adaptive geo-fencing with local storage architecture on ad hoc networks
    Ryo Yamamoto; Satoshi Ohzahata; Toshihiko Kato
    International Conference on Electronics, Information and Communication, ICEIC 2018, Institute of Electrical and Electronics Engineers Inc., 2018-, 1-4, 02 Apr. 2018, Peer-reviwed
    International conference proceedings, English
  • Proposal and Study on Implementation of Data Eavesdropping Protection Method over Multipath TCP Communication Using Data Scrambling and Path Dispersion
    Toshihiko Kato; Shihan Cheng; Ryo Yamamoto; Satoshi Ohzahata; Nobuo Suzuki
    International Journal On Advances in Security, 11, 1&2, 118-126, 2018, Peer-reviwed
    Scientific journal, English
  • Proposal and Performance Analysis of Hybrid NDN Based Ad Hoc Routing Combining Proactive and Reactive Mechanisms
    Ngo Quang Minh; Ryo Yamamoto; Satoshi Ohzahata; Toshihiko Kato
    International Journal On Advances in Networks and Services, 11, 1&2, 1-10, 2018, Peer-reviwed
    Scientific journal, English
  • Experimental Analysis and Resolution Proposal on Performance Degradation of TCP over IEEE 802.11n Wireless LAN Caused by Access Point Scanning
    Toshihiko Kato; Kento Kobayashi; Sota Tasaki; Masataka Nomoto; Ryo Yamamoto; Satoshi Ohzahata
    International Journal On Advances in Telecommunications, 11, 1&2, 10-19, 2018, Peer-reviwed
    Scientific journal, English
  • How insufficient send socket buffer affects MPTCP performance over paths with different delay
    Toshihiko Kato; Adhikari Diwakar; Ryo Yamamoto; Satoshi Ohzahata; Nobuo Suzuki
    Advances in Intelligent Systems and Computing, Springer Verlag, 746, 614-624, 2018, Peer-reviwed
    International conference proceedings, English
  • A Study on How Coarse-grained Clock System Influences NDN Rate-based Congestion Control
    Toshihiko Kato; Kazuki Osada; Ryo Yamamoto; Satoshi Ohzahata
    Proceedings of The Seventeenth International Conference on Networks (ICN 2018), 35-40, 2018, Peer-reviwed
    International conference proceedings, English
  • Experimental Analysis of Spurious Timeout Detection Methods with LTE Handover Emulation
    Toshihiko Kato; Masahito Moriyama; Ryo Yamamoto; Satoshi Ohzahata
    Proceedings of 7th International Conference on Theory and Practice in Modern Computing (TPMC 2018), 104-112, 2018, Peer-reviwed
    International conference proceedings, English
  • Applying Lomb Periodogram to Round-trip Time Estimation from Unidirectional Packet Traces with Different TCP Congestion Controls
    Toshihiko Kato; Xiaofan Yan; Ryo Yamamoto; Satoshi Ohzahata
    Proceedings of The Thirteenth International Conference on Internet Monitoring and Protection (ICIMP 2018), 1-6, 2018, Peer-reviwed
    International conference proceedings, English
  • TCP Congestion Control over IEEE 802.11 Wireless LANs Based on K-means Clustering Focusing on Congestion Window Size and Round-trip Time
    Tomokazu Moriyama; Ryo Yamamoto; Satoshi Ohzahata; Toshihiko Kato
    Proceedings of 9th International Conference on Data Communication Networking (DCNET 2018), 25-32, 2018, Peer-reviwed
    International conference proceedings, English
  • An Adaptive BandwidthReservation Method for a Content-Centric Network
    Tomoharu Endo; Atsuko Yokotani; Satoshi Ohzahata; Ryo Yamamoto; Toshihiko Kato
    Proc. of IEEE COMPSAC 2018 Workshop IWFIT, 6-pages, 2018, Peer-reviwed
    International conference proceedings, English
  • Implementation of Eavesdropping Protection Method over MPTCP Using Data Scrambling and Path Dispersion
    Toshihiko Kato; Shihan Cheng; Ryo Yamamoto; Satoshi Ohzahata; Nobuo Suzuki
    Proceedings of The Twelfth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2018), 108-113, 2018, Peer-reviwed
    International conference proceedings, English
  • Identification of TCP Congestion Control Algorithms from Unidirectional Packet Traces
    Toshihiko Kato; Xiaofan Yan; Ryo Yamamoto; Satoshi Ohzahata
    Proceedings of 2nd International Conference on Communication and Network Technology (ICCNT 2018), 1-6, 2018, Peer-reviwed
    International conference proceedings, English
  • Alternating Primary Subflow in MPTCP by External Program without Kernel Modification
    R. Horigome; N. Yamai; N. Kitagawa; S. Ohzahata
    Proc. of SRS 2018 in IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC 2018), 962-965, 2018, Peer-reviwed
    International conference proceedings, English
  • Throughput Improvement of MPTCP by Selective Bicasting with Cross-Layer Control in Wireless Environment
    M. Fukuyama; N. Yamai; S. Ohzahata; N. Kitagawa
    Proc. of ADMNET 2018 in IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC 2018), 204-209, 2018, Peer-reviwed
    International conference proceedings, English
  • Performance Evaluation of MultiPath TCP Congestion Control
    Toshihiko Kato; Adhikari Diwakar; Ryo Yamamoto; Satoshi Ohzahata; Nobuo Suzuki
    Proc. of WorldCIST'18, 19-24, 2018, Peer-reviwed
    International conference proceedings, English
  • Resolving Bufferbloat in TCP Communication over IEEE 802.11n WLAN by Reducing MAC Retransmission Limit at Low Data Rate
    Masataka Nomoto; Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    Proc. ICN 2017, 69-74, 01 Apr. 2017, Peer-reviwed
    International conference proceedings, English
  • IEEE 802.11n無線LANのアップロードTCP通信におけるBufferbloat問題に対するアクセスポイントでの対応方式
    野元 祐孝; 策力木格; 大坐畠智; 加藤 聰彦
    情報処理学会論文誌, 情報処理学会論文誌, 58, 2, 427-438, 01 Feb. 2017, Peer-reviwed, IEEE 802.11n無線アクセスポイントを経由するTCP通信では,低いMACレベルデータレートが使用される場合に,往復遅延が増加するBufferbloat問題が発生し,同じキューを共通する他の通信の遅延時間が増加し,ユーザレベルの品質の悪化となる.この対処として,アクティブキュー管理方式,筆者らが先に示した無線LANの最大再送回数を制限する方法,遅延増加時にTCP通信を停止する方法などが提案されている.しかしこれらはすべて,データの送信側に実装する必要がある.このため,端末からアクセスポイントへのアップロード転送においては,端末のすべてにこのような方式を導入しなければならない.そこで本稿では,データの受信側であるアクセスポイントにおいて,低いMACレベルデータレートで無線LANフレームの最大再送回数を制限したと同様な効果を与えることにより,TCPの輻輳ウィンドウを減少させ,Bufferbloat問題に対応する方法を提案する.パソコンを用いたアクセスポイントに提案方式を実装することにより,Bufferbloat問題に対応していない端末で,低いMACレベルデータレートでの往復遅延を減少させられること,さらにBufferbloat問題に対する方法を実装している端末においてもTCP通信のスループットを悪化させることがないことを明らかにした.IEEE 802.11n wireless LANs provides a Bufferbloat problem such that the round-tirp delay increases in TCP communications when the MAC level data is low such as 6.5Mbps. This problem degrades user level quality of service for communications sharing the transmission queue with the TCP communications. In order to resolve this problem, several schemes are proposed such as a scheme based on active queue management, our previous scheme reducing the retry-out limit at low data rate, and a scheme stopping sending TCP level data when the queue contains more than a specific number of packes. However, those schemes need to be implemented at the sender side. In this paper, we propose a new scheme resolving a Bufferbloat problem in the upload TCP communications by providing an effect at a receiving side access point similar to reducing the retry-out limit when the MAC level data rate is low. This decreases the congestion window size in the sending side and can reduce the delay. This paper also shows the results of the performance evaluation by implementing the proposed method in a PC based access point. According to the results, the proposed method decreases the round-trip time in the low MAC data rate and does not reduce the TCP throughput. It does not give any influences on the TCP thoughput for the terminals supporting the conventional schemes for Bufferbroat problems.
    Scientific journal, Japanese
  • Inferring partial orders of nodes for hierarchical network layout
    Hsiang-Yun Wu; Shigeo Takahashi; Hiroko Nakamura Miyamura; Satoshi Ohzahata; Akihiro Nakao
    IS and T International Symposium on Electronic Imaging Science and Technology, Society for Imaging Science and Technology, 60, 6, 118-130, 2017, Peer-reviwed
    International conference proceedings, English
  • A Hierarchical Opportunistic Routing with Moderate Clustering for Ad Hoc Networks
    Ryo Yamamoto; Satoshi Ohzahata; Toshihiko Kato
    IEICE TRANSACTIONS ON COMMUNICATIONS, E100B, 1, 54-66, Jan. 2017, Peer-reviwed
    Scientific journal, English
  • A TDMA/DCF Hybrid QoS Scheme for Ad Hoc Networks
    Jing Lin; Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    IEICE TRANSACTIONS ON COMMUNICATIONS, E100B, 1, 42-53, Jan. 2017, Peer-reviwed
    Scientific journal, English
  • A Routing Protocol Proposal for NDN Based Ad Hoc Networks Combining Proactive and Reactive Routing Mechanisms
    Ngo Quang Minh; Ryo Yamamoto; Satoshi Ohzahata; Toshihiko Kato
    The Thirteenth Advanced International Conference on Telecommunications (AICT 2017), 80-86, 2017, Peer-reviwed
    International conference proceedings, English
  • A QoS Aware Ad Hoc Multicast by Combining TDMA and IEEE 802.11 DCF, International Conferences Computer Graphics
    Jing Lin; Ryo Yamamoto; Satoshi Ohzahata; Toshihiko Kato
    Visualization, Computer Vision and Image Processing 2017 and Big Data Analysis, Data Mining and Computational Intelligence 2017, 204-211, 2017, Peer-reviwed
    International conference proceedings, English
  • Frame Aggregation Size Determination for IEEE 802.11ac WLAN Considering Channel Utilization and Transfer Delay
    Tomokazu Moriyama; Ryo Yamamoto; Satoshi Ohzahata; Toshihiko Kato
    14th International Conference on Wireless Networks and Mobile Systems (WINSYS 2017), 89-94, 2017, Peer-reviwed
    International conference proceedings, English
  • Protecting Eavesdropping over Multipath TCP Communication Based on Not-Every-Not-Any Protection
    Toshihiko Kato; Shilan Cheng; Ryo Yamamoto; Satoshi Ohzahata; Nobuo Suzuki
    The Eleventh International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2017), 87-92, 2017, Peer-reviwed
    International conference proceedings, English
  • A Solution for Bufferbloat Problem in Upload TCP Communication over IEEE 802.11n WLAN Only by Modifying Access Point
    Masataka Nomoto; Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    The Sixth International Conference on Communications, Computation, Networks and Technologies (INNOV 2017), 8-13, 2017, Peer-reviwed
    International conference proceedings, English
  • Increasing the Number of Connectable ONUs with Subcarrier Digital Modulation Passive Optical Network
    Atsuko Yokotani; Satoshi Ohzahata; Hiromi Ueda
    Proc.of APCC 2017, 6 pages, 2017, Peer-reviwed
    International conference proceedings, English
  • Experimental Analysis on How Access Point Scanning Impacts on TCP Throughput over IEEE802.11n Wireless LAN
    Kento Kobayashi; Yoshiki Hashimoto; Ryo Yamamoto; Satoshi Ohzahata; Toshihiko Kato
    Twelfth International Conference on Wireless and Mobile Communications (ICWMC 2016), 115-120, Nov. 2016, Peer-reviwed
    International conference proceedings, English
  • Microscopic Approach for Experimental Analysis of Multipath TCP Troughput under Insufficient Send/Receive Socket Buffers
    Toshihiko Kato; Masaaki Tenjin; Ryo Yamamoto; Satoshi Ohzahata; Hiroyuki Shinbo
    15th International Conference WWW/Internet 2016 (ICWI 2016), 191-199, Oct. 2016, Peer-reviwed
    International conference proceedings, English
  • Combining two sequential algorithms for classification of intrusion detection system dataset
    Phetlasy Sornxayya; Satoshi Ohzahata; Celimuge Wu; Toshihiko Kato
    IWSEC 2016, reviewed by abstract only, Sep. 2016, Peer-reviwed
    International conference proceedings, English
  • Performance Anomaly in Download TCP Flows Over IEEE 802.11n Wireless LAN
    Yoshiki Hashimoto; Masataka Nomoto; Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    Proc. The Fifth International Conference on Communications, Computation, Networks and Technologies, 13-18, Aug. 2016, Peer-reviwed
    International conference proceedings, English
  • IBGP Solution by Combining Route Reflection And Shared Tree Based Multicast
    Toshihiko Kato; Yao Koffi; Hubert Wilfried; Celimuge Wu; Satoshi Ohzahata
    Proc. 5th International Conference on Theory and Practice in Modern Computing, 203-210, Jul. 2016, Peer-reviwed
    International conference proceedings, English
  • A Study on How to Characterize TCP Congestion Control Algorithms from Unidirectional Packet Traces
    Toshihiko Kato; Leelianou Yongxialee; Ryo Yamamoto; Satoshi Ohzahata
    The Eleventh International Conference on Internet Monitoring and Protection, 23-28, 22 May 2016, Peer-reviwed
    International conference proceedings, English
  • How to Utilize Inter-flow Network Coding in VANETs: A Backbone Based Approach
    Celimuge Wu; Satoshi Ohzahata; Yusheng Ji; Toshihiko Kato
    IEEE Transactions on Intelligent Transportation Systems, IEEE, 17, 8, 2223-2237, 05 Feb. 2016, Peer-reviwed
    Scientific journal, English
  • A Practical and Efficient Overhearing Strategy for Reliable Content Distribution over a Single Hop Ad Hoc Network
    Hiroaki Yokose; Koji Nitta; Satoshi Ohzahata; Toshihiko Kato
    IPSJ, IPSJ, 24, 2, 292-301, 01 Feb. 2016, Peer-reviwed, Nowadays, wireless LAN is equipped in most portable devices and widely deployed, and then we can communicate over wireless link with low cost. However, when the same content is simultaneously downloaded by several terminals with unicast in a wireless LAN, the bandwidth must be divided among the terminals and the download speed is reduced. With using the broadcast nature of wireless media, pseudo multicasting methods, which overhear the unicast flow to realize multicast like communication, have been proposed. In the pseudo multicasting methods, since parts of the content is obtained by overhearing the TCP/UDP flows of a specific content going to other terminals in a wireless LAN, and the server need not send the content for each client repeatedly. These methods enable to realize multicasting with a practical way. However, redundant unicast traffic is still generated because the receivers do not obtain contents via overhearing in an efficient way. Based on the pseudo multicasting, we propose an efficient, flexible and reliable content distribution method over single hop wireless ad hoc network in this paper. In the proposed method a content is divided into pieces and the server distributes it according to the download status of each receivers at the application level. To accelerate downloading, we propose a method for selecting the piece and the terminal for transmission taking the effect of network coding for efficient overhearing. We developed a testbed and confirmed that the proposed scheduling accelerates the download speed even when the communication speed of each terminal is different.
    Scientific journal, English
  • Experimental Analysis on Performance Anomaly for Download Data Transfer at IEEE 802.11n Wireless LAN
    Yoshiki Hashimoto; Masataka Nomoto; Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    Proc. of ICN 2016, 22-27, 01 Feb. 2016, Peer-reviwed
    International conference proceedings, English
  • Comparing TCP Congestion Control Algorithms Based on Passively Collected Packet Traces
    Toshihiko Kato; Atsushi Oda; Celimuge Wu; Satoshi Ohzahata
    Proc. of ICSNC 2015, 135-141, 01 Feb. 2016, Peer-reviwed
    International conference proceedings, English
  • Reinforcement learning-based parameter tuning for a broadcast protocol in VANETs
    Celimuge Wu; Satoshi Ohzahata; Yusheng Ji; Tsutomu Yoshinaga; Yoshihiko Kato
    IEICE Technical Report, 115, 408,CQ2015-105, 73-78, Jan. 2016
    English
  • Piece Distribution Scheduling for Streaming Content Delivery with Pseudo-Multicast over Wireless LAN
    Akihiro Kanayama; Satoshi Ohzahata; Toshihiko Kato
    2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2 pages, 2016, Peer-reviwed
    International conference proceedings, English
  • Improving the Tor Traffic Distribution with Circuit Switching Method
    Timothy Girry Kale; Satoshi Ohzahata; Celimuge Wu; Toshihiko Kato
    2016 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (HPSR), 106-107, 2016, Peer-reviwed
    International conference proceedings, English
  • Evaluating Tor Modified Switching Algorithm in the Emulation Environment
    Timothy Girry Kale; Satoshi Ohzahata; Celimuge Wu; Toshihiko Kato
    2016 22ND ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC), 510-516, 2016, Peer-reviwed
    International conference proceedings, English
  • Suppressing Selfish Transmissions with Extending NAV Period and Resetting CW of Access Point in Wireless LAN
    Takashi Sasagawa; Satoshi Ohzahata; Toshihiko Kato
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 1910-1916, 2016, Peer-reviwed
    International conference proceedings, English
  • A Hierarchical Opportunistic Routing with Stability Information for Mobile Ad Hoc Networks
    Ryo Yamamoto; Satoshi Ohzahata; Toshihiko Kato
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR COMMUNICATIONS (ATC), 43-47, 2016, Peer-reviwed
    International conference proceedings, English
  • Improving Consistency of Parallel Emulation for Multi-hop Wireless Ad-hoc Network
    Yusuke Yamazaki; Timothy Girry Kale; Satoshi Ohzahata; Toshihiko Kato
    2016 FOURTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 338-342, 2016, Peer-reviwed
    International conference proceedings, English
  • Toward Practical and Intelligent Routing in Vehicular Ad Hoc Networks
    Celimuge Wu; Yusheng Ji; Fuqiang Liu; Satoshi Ohzahata; Toshihiko Kato
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 64, 12, 5503-5519, Dec. 2015, Peer-reviwed
    Scientific journal, English
  • Adaptive Multi-hop Broadcasting Considering Packet Payload Size
    Celimuge Wu; Satoshi Ohzahata; Yusheng Ji; Toshihiko Kato
    IEICE Technical Report, 115, 327,CQ2015-83, 43-48, Nov. 2015
    English
  • Efficient Broadcasting in VANETs Using Dynamic Backbone and Network Coding
    Celimuge Wu; Xianfu Chen; Yusheng Ji; Satoshi Ohzahata; Toshihiko Kato
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 14, 11, 6057-6071, Nov. 2015, Peer-reviwed
    Scientific journal, English
  • Reducing congestion in the tor network with circuit switching
    Kale Timothy Girry; Satoshi Ohzahata; Celimuge Wu; Toshihiko Kato
    Journal of Information Processing, Information Processing Society of Japan, 23, 5, 589-602, 15 Sep. 2015, Peer-reviwed
    Scientific journal, English
  • An Intelligent Broadcast Protocol for VANETs Based on Transfer Learning
    Celimuge Wu; Xianfu Chen; Yusheng Ji; Satoshi Ohzahata; Toshihiko Kato
    in Proceedings of IEEE VTC 2015 Spring, 2015, Jun. 2015, Peer-reviwed
    International conference proceedings, English
  • Joint Fuzzy Relays and Network-Coding-Based Forwarding for Multihop Broadcasting in VANETs
    Celimuge Wu; Satoshi Ohzahata; Yusheng Ji; Toshihiko Kato
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 16, 3, 1415-1427, Jun. 2015, Peer-reviwed
    Scientific journal, English
  • Inter-vehicle Communications: Research Challenges & Opportunities
    Celimuge Wu; Satoshi Ohzahata; Yusheng Ji; Toshihiko Kato
    Technical Report of IEICE, 115, 42, IN2015-6, 27-32, May 2015, Invited
    Symposium, English
  • A Routing Protocol for VANETs with Adaptive Frame Aggregation and Packet Size Awareness
    Celimuge Wu; Yusheng Ji; Satoshi Ohzahata; Toshihiko Kato
    ICC 2015, IEEE, 6565-6570, May 2015, Peer-reviwed
    International conference proceedings, English
  • Combining Sequential Minimal Optimization and Naïve Bayes Algorithms for Accurate Data Classification
    Sornxayya Phetlasy; Satoshi Ohzahata; Celimuge Wu; Toshihiko Kato
    Proc. of ICT-ISPC 2015, 4 pages, May 2015, Peer-reviwed
    International conference proceedings, English
  • Design of EV Common Service Platform,
    Jing WEI; Jinglin LI; Zhihan LIU; Celimuge WU; Satoshi OHZAHATA; Toshihiko KATO
    ICT-ISPC 2015, 4 pages, May 2015, Peer-reviwed
    International conference proceedings, English
  • 並列処理を用いたネットワークエミュレーションにおける無線1ホップ隣接端末間の因果関係改善方式
    新田幸司; 大坐畠 智; 加藤聰彦
    電子情報通信学会 和文論文誌B, J98-B, 2, 141-152, 01 Feb. 2015, Peer-reviwed
    Scientific journal, Japanese
  • Future Channel Utilization-Aware Routing for Cognitive Radio Ad Hoc Networks
    Celimuge Wu; Juan Xu; Yusheng Ji; Satoshi Ohzahata; Toshihiko Kato
    IEICE TRANSACTIONS ON COMMUNICATIONS, E98B, 1, 107-115, Jan. 2015, Peer-reviwed
    Scientific journal, English
  • A Routing Protocol for VANETs with Adaptive Frame Aggregation and Packet Size Awareness
    Celimuge Wu; Yusheng Ji; Satoshi Ohzahata; Toshihiko Kato
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 6565-6570, 2015, Peer-reviwed
    International conference proceedings, English
  • Performance Evaluation of Time Slot Based QoS Aware Ad Hoc Network Scheme for CBR and TCP Flows
    Jing Lin; Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    2015 17TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM APNOMS, 139-144, 2015, Peer-reviwed
    International conference proceedings, English
  • Evaluation of Dynamic Circuit Switching to Reduce Congestion in Tor
    Timothy Girry Kale; Satoshi Ohzahata; Celimuge Wu; Toshihiko Kato
    25TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC 2015), 326-331, 2015, Peer-reviwed
    International conference proceedings, English
  • Can DTN Improve the Performance of Vehicle-to-roadside Communication?
    Celimuge Wu; Yusheng Ji; Satoshi Ohzahata; Toshihiko Kato
    2015 IEEE 26TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 1934-1939, 2015, Peer-reviwed
    International conference proceedings, English
  • Packet Size-Aware Broadcasting in VANETs With Fuzzy Logic and RL-Based Parameter Adaptation
    Celimuge Wu; Xianfu Chen; Yusheng Ji; Fuqiang Liu; Satoshi Ohzahata; Tsutomu Yoshinaga; Toshihiko Kato
    IEEE ACCESS, 3, 2481-2491, 2015, Peer-reviwed
    Scientific journal, English
  • Sequential Combination of Two Classifier Algorithms for Binary Classification to Improve the Accuracy
    Sornxayya Phetlasy; Satoshi Ohzahata; Celimuge Wu; Toshihiko Kato
    PROCEEDINGS OF 2015 THIRD INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 576-580, 2015, Peer-reviwed
    International conference proceedings, English
  • A Packet Size-aware Multi-hop Broadcast Protocol for VANETs Based on Adaptive Redundancy
    Celimuge Wu; Xianfu Chen; Yusheng Ji; Satoshi Ohzahata; Toshihiko Kato
    The 24th International Conference on Computer Communications and Networks (ICCCN), 134-139, 2015, Peer-reviwed
    International conference proceedings, English
  • A Distributed Dynamic Channel Assignment and Routing Framework for Cognitive Sensor Systems
    Celimuge Wu; Satoshi Ohzahata; Yusheng Ji; Toshihiko Kato
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, E97D, 10, 2613-2622, Oct. 2014, Peer-reviwed
    Scientific journal, English
  • Coded packets over lossy links: A redundancy-based mechanism for reliable and fast data collection in sensor networks
    Celimuge Wu; Yusheng Ji; Juan Xu; Satoshi Ohzahata; Toshihiko Kato
    COMPUTER NETWORKS, 70, 9, 179-191, Sep. 2014, Peer-reviwed
    Scientific journal, English
  • A Multi-hop Broadcast Protocol for VANETs Utilizing Backbone-based Forwarding and Network Coding
    Celimuge Wu; Satoshi Ohzahata; Yusheng Ji; Toshihiko Kato
    IEICE Technical Report, 114, 160, 75-80, Jul. 2014
    Symposium, English
  • Inter-flow Network Coding for Unicast Routing Protocols in Vehicular Ad Hoc Networks
    Celimuge Wu; Satoshi Ohzahata; Yusheng Ji; Toshihiko Kato
    IEICE Technical Report, 114, 110, 1-6, Jun. 2014
    Symposium, English
  • 無線LAN におけるアクセスポイントと端末の協調による送信機会確保のためのメディアアクセス制御
    熊谷雄太; 大坐畠 智; 加藤聰彦
    電子情報通信学会 和文論文誌B, 電子情報通信学会, J97-B, 2, 110-119, Feb. 2014, Peer-reviwed
    Scientific journal, Japanese
  • Analyzing the Drawbacks of Node-Based Delays in Tor
    Timothy Girry Kale; Satoshi Ohzahata; Celimuge Wu; Toshihiko Kato
    Proc. of IEEE CQR, 6 pages, 01 Jan. 2014, Peer-reviwed
    International conference proceedings, English
  • TCP Performance Problem on Timeout Retransmission Triggered by Bursty Packet Losses
    Weikai Wang; Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    Proc. of International Conference on Theory and Practice in Modern Computing, 141-148, 01 Jan. 2014, Peer-reviwed
    International conference proceedings, English
  • Providing Fast Broadcasting by Reserving Time Slots for Multi-hop Distance in VANETs
    Celimuge Wu; Satoshi Ohzahata; Yusheng Ji; Toshihiko Kato
    2014 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 213-218, 2014, Peer-reviwed
    International conference proceedings, English
  • Toward a Totally Distributed Flat Location Service for Vehicular Ad Hoc Networks
    Celimuge Wu; Satoshi Ohzahata; Yusheng Ji; Toshihiko Kato
    2014 IEEE 79TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-SPRING), 6 pages, 2014, Peer-reviwed
    International conference proceedings, English
  • Joint MAC and Network Layer Control for VANET Broadcast Communications Considering End-to-end Latency
    Celimuge Wu; Satoshi Ohzahata; Yusheng Ji; Toshihiko Kato
    2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 689-696, 2014, Peer-reviwed
    International conference proceedings, English
  • A MAC Protocol for Delay-sensitive VANET Applications With Self-learning Contention Scheme
    Celimuge Wu; Satoshi Ohzahata; Yusheng Ji; Toshihiko Kato
    2014 IEEE 11TH CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 729-734, 2014, Peer-reviwed
    International conference proceedings, English
  • A Circuit Switching Method for Improving Congestion of Tor Network
    Kale Timothy Girry; Satoshi Ohzahata; Celimuge Wu; Toshihiko Kato
    2014 NINTH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA), 416-421, 2014, Peer-reviwed
    International conference proceedings, English
  • Performance Analysis of a Content Distribution Method using Pseudo-Multicast with File Piecing for Wireless Multi-hop Environment
    Kazuaki Nishizaka; Satoshi Ohzahata; Toshihiko Kato
    2014 SECOND INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 192-197, 2014, Peer-reviwed
    International conference proceedings, English
  • 熊谷雄太, 大坐畠 智, 加藤聰彦
    無線LAN におけるアクセスポイントと端末の協調による送信機会確保のためのメディアアクセス制御
    電子情報通信学会 和文論文誌B, J97-B, 2, 110-119, 2014, Peer-reviwed
    Scientific journal, Japanese
  • Multi-hop Broadcasting in VANETs Integrating Intra-flow and Inter-flow Network Coding
    Celimuge Wu; Satoshi Ohzahata; Yusheng Ji; Toshihiko Kato
    2014 IEEE 80TH VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL), 1091-1096, 2014, Peer-reviwed
    International conference proceedings, English
  • A QoS Supporting Ad Hoc Network Protocol Combing Admission Based TDMA and 802.11 DCF
    Jing Lin; Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    2014 16th Asia-Pacific Network Operations and Management Symposium (APNOMS), 4pages, 2014, Peer-reviwed
    International conference proceedings, English
  • Multi-hop Broadcasting in WAVE Multi-channel Vehicular Networks: Single Transceiver Case
    Celimuge Wu; Satoshi Ohzahata; Yusheng Ji; Toshihiko Kato
    2014 IEEE 17TH INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS (ITSC), 1091-1096, 2014, Peer-reviwed
    International conference proceedings, English
  • Resolving bufferbloat problem in 802.11n WLAN by weakening MAC loss recovery for TCP stream
    Masataka Nomoto; Toshihiko Kato; Celimuge Wu; Satoshi Ohzahata
    Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, PDCN 2014, Acta Press, 293-300, 2014, Peer-reviwed
    International conference proceedings, English
  • Experimental Analysis of TCP Behaviors against Bursty Packet Losses Caused by Transmission Interruption
    Weikai Wang; Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    ICN 2014, 136-141, 2014, Peer-reviwed
    International conference proceedings, English
  • Inferring TCP Congestion Control Algorithms by Correlating Congestion Window Sizes and their Differences
    Toshihiko Kato; Atsushi Oda; Shun Ayukawa; Celimuge Wu; Satoshi Ohzahata
    ICSNC 2014, 42-47, 2014, Peer-reviwed
    International conference proceedings, English
  • Making Inter-flow Network Coding Possible for Unicast Routing in VANETs
    Celimuge Wu; Satoshi Ohzahata; Yusheng Ji; Toshihiko Kato
    2014 INTERNATIONAL CONFERENCE ON CONNECTED VEHICLES AND EXPO (ICCVE), 829-835, 2014, Peer-reviwed
    International conference proceedings, English
  • Practical Solution for Broadcasting in VANETs using Neighbor Information
    Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    IEICE Transactions on Communications, E96-B, 11, 2856-2864, Nov. 2013, Peer-reviwed
    Scientific journal, English
  • A VANET Routing Protocol Considering MAC Efficiency
    Celimuge Wu; Satoshi Ohzahata; Yusheng Ji; Toshihiko Kato
    IEICE Technical Report, 113, Nov. 2013
    Symposium, English
  • Flexible, Portable, and Practicable Solution for Routing in VANETs: A Fuzzy Constraint Q-Learning Approach
    Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 62, 9, 4251-4263, Nov. 2013, Peer-reviwed
    Scientific journal, English
  • Improving VANET unicast routing protocols by using cooperative relays and network coding
    Celimuge Wu; Satoshi Ohzahata; Yusheng Ji; Toshihiko Kato
    IEICE Technical Report, 113, Oct. 2013
    Symposium, English
  • Can We Generate Efficient Routes by Using Only Beacons? Backbone Routing in VANETs
    Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    2013 IEEE 24TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2929-2934, 2013, Peer-reviwed
    International conference proceedings, English
  • Network Coding Assisted Cooperative Relay Scheme for Sender-oriented Broadcast in VANETs
    Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 1369-1374, 2013, Peer-reviwed
    International conference proceedings, English
  • A reliable and flexible data gathering protocol for battery limited wireless sensor networks
    Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    International Journal of Communication Networks and Distributed Systems, 11, 2, 139-156, 2013, Peer-reviwed
    Scientific journal, English
  • Practical Solution for Broadcasting in VANETs using Neighbor Information
    Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    IEICE Transaction on Communication, J97-B, 2, 110-119, 2013, Peer-reviwed
    Scientific journal, English
  • Data Dissemination with Dynamic Backbone Selection in Vehicular Ad Hoc Networks
    Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    2013 IEEE 78TH VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL), 6 pages, 2013, Peer-reviwed
    International conference proceedings, English
  • A Loss-tolerant Scheme for Unicast Routing in VANETs using Network Coding
    Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    2013 9TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 1058-1063, 2013, Peer-reviwed
    International conference proceedings, English
  • Joint MAC network layer broadcast protocol for vehicular ad hoc networks
    Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    2013 IEEE International Conference on Communications Workshops, ICC 2013, 495-499, 2013, Peer-reviwed
    International conference proceedings, English
  • OPTIMIZATION OF AREA SPLITTING TO MINIMIZE OSPF LSA EXCHANGE
    Toshihiko Kato; Tsukasa Miyamae; Celimuge Wu; Satoshi Ohzahata
    The IADIS Theory and Practice in Modern Computing 2013 (TPMC 2013) Conference, *, 2013, Peer-reviwed
    International conference proceedings, English
  • Can We Generate Efficient Routes by Using Only Beacons? Backbone Routing in VANETs,
    Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    Proc. of PIMRC 2013, 2944-2949, 2013, Peer-reviwed
    International conference proceedings, English
  • An Improvement of OLSR Using Fuzzy Logic Based MPR selection
    Narangerei Dashbyamba; Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    2013 15TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 6 pages, 2013, Peer-reviwed
    International conference proceedings, English
  • Effectiveness of Performance Flag Selection for Enhancing Tor Circuits
    Kale Timothy Girry; Satoshi Ohzahata; Celimuge Wu; Toshihiko Kato
    2013 15TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 3 pages, 2013, Peer-reviwed
    International conference proceedings, English
  • An efficient overhearing strategy for content distribution in wireless LAN
    Hiroaki Yokose; Satoshi Ohzahata; Toshihiko Kato
    Asian Internet Engineeering Conference, AINTEC 2013, Association for Computing Machinery, 33-40, 2013, Peer-reviwed
    International conference proceedings, English
  • A routing protocol for cognitive radio ad hoc networks giving consideration to future channel assignment
    Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    Proceedings - 2013 1st International Symposium on Computing and Networking, CANDAR 2013, 227-232, 2013, Peer-reviwed
    International conference proceedings, English
  • Routing in VANETs: A Fuzzy Constraint Q-Learning Approach
    Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    Proc. of GLOBECOM 2012, 231-218, Dec. 2012, Peer-reviwed
    International conference proceedings, English
  • An Efficient Contents Distribution Method Using Overhearing and File Piecing in Wireless LAN
    Hiroaki Yokose; Satoshi Ohzahata; Toshihiko Kato
    Proc. of APSITT 2012, 6 pages, Nov. 2012, Peer-reviwed
    International conference proceedings, English
  • Winnyネットワークにおける検索クエリの遮断によるファイル流通制御方式
    中澤 大暁; 吉田 雅裕; 大坐畠 智; 中尾 彰宏; 川島 幸之助
    電子情報通信学会 和文論文誌B, The Institute of Electronics, Information and Communication Engineers, 95-B, 5, 636-648, May 2012, Peer-reviwed, 近年,P2P方式を用いたファイル共有やVoIP,広告配信,データ通信などが世界中で広く使われている.しかしながら,ファイル共有システムでは情報流出や著作権侵害ファイルの流通の問題が発生している.そこで本研究では,ネットワーク上にファイル検索リンクを多数もつ制御ピアを配置することで,ファイルの検索効率を適切に変化させ,制御対象ファイルの流通を制御する方式を提案する.提案方式では,ネットワーク構造やピア特性に着目した制御により,ファイル共有システムでファイル検索に利用される"検索クエリ"をブロックすることで,制御対象フアイルの位置情報を含む"キー"の検索効率を低下させる.そして,実際のWinnyネットワーク上で提案方式の有用性を評価した.評価実験では,検索クエリの帰還率や検索成功率,"キー"の拡散度合いを測定した.その結果,検索ネットワーク全体の70%以上のピアを制御範囲とすることで,検索ネットワーク上の"キー"を減少させ,検索成功率を1%以下にすることができた.
    Scientific journal, Japanese
  • VANET Broadcast Protocol Based on Fuzzy Logic and Lightweight Retransmission Mechanism
    Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    IEICE TRANSACTIONS ON COMMUNICATIONS, E95B, 2, 415-425, Feb. 2012, Peer-reviwed
    Scientific journal, English
  • Routing in VANETs: A Fuzzy Constraint Q-Learning Approach
    Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 195-200, 2012, Peer-reviwed
    International conference proceedings, English
  • A low latency path diversity mechanism for sender-oriented broadcast protocols in VANETs
    Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    Elsevier Journal of Ad Hoc Networks, 11, 7, 2059-2068, 2012, Peer-reviwed
    Scientific journal, English
  • An adaptive redundancy-based mechanism for fast and reliable data collection in WSNs
    Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    2012 IEEE 8TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS), 347-352, 2012, Peer-reviwed
    International conference proceedings, English
  • Dynamic channel assignment and routing for cognitive sensor networks
    Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    Proceedings of the International Symposium on Wireless Communication Systems, 86-90, 2012, Peer-reviwed
    International conference proceedings, English
  • How to Broadcast Efficiently in Vehicular Ad Hoc Networks Without GPS
    Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    2012 IEEE VEHICULAR NETWORKING CONFERENCE (VNC), 258-264, 2012, Peer-reviwed
    International conference proceedings, English
  • A Broadcast Path Diversity Mechanism for Delay Sensitive VANET Safety Applications
    Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    Proc. of IEEE Vehicular Networking Conference, 292-297, Nov. 2011, Peer-reviwed
    International conference proceedings, English
  • Shareネットワークに対するコンテンツポイズニングを用いたファイル流通制御方式
    吉田 雅裕; 大坐畠 智; 川島 幸之助; 中尾 彰宏
    電子情報通信学会 和文論文誌B, The Institute of Electronics, Information and Communication Engineers, 94, 5, 686-697, May 2011, Peer-reviwed, P2Pファイル共有ネットワークは世界中で非常に多くのユーザに利用されている.しかし,現在のP2Pファイル共有ネットワークにはファイル流通制御機能が実装されていないため,著作権侵害ファイルやマルウェアなどの流通が大きな社会問題となっている.これらの問題を解決するために,コンテンツポイズニングを用いたファイル流通制御方式が提案されている.コンテンツポイズニングとは,一つのファイルを複数のブロックに分割して転送するP2Pファイル共有ネットワークに対して,ファイル転送中に偽装ブロックを混ぜて転送することで,ダウンロードしたファイルを不完全なものにして破損させる方式である.しかしながら,コンテンツポイズニングの従来の適用方式には,制御によってP2Pトラヒックが著しく増加してしまうなど,四つの解決すべき課題が存在する.そこで本論文では,これら四つの課題を解決したコンテンツポイズニングの改良方式を提案する.そして,10万台以上のアクティブピアによって構成される実際のShareネットワーク上で提案方式の有効性を評価した.評価実験の結果,提案方式をShareネットワークに適用した場合は,Shareピアが特定のファイルを入手できる確率が,適用しない場合と比較して5%まで低下することを確認した.また,提案方式はP2Pトラヒックの増加を,従来方式と比較して4%まで抑えられることを示した.
    Scientific journal, Japanese
  • An experimental study of peer behavior in a pure P2P network
    Satoshi Ohzahata; Konosuke Kawashima
    JOURNAL OF SYSTEMS AND SOFTWARE, 84, 1, 21-28, Jan. 2011, Peer-reviwed
    Scientific journal, English
  • Adaptive view-dependent tree graph visualization
    Hiroko Nakamura Miyamura; Satoshi Ohzahata; Yuji Shinano; Ryuhei Miyashiro
    Proceedings of the 2011 8th International Joint Conference on Computer Science and Software Engineering, JCSSE 2011, 187-192, 2011, Peer-reviwed
    International conference proceedings, English
  • Fuzzy One-phase Pull Diffusion for WSNs in Fading Channel
    Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    2011 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS AND WORKSHOPS (DCOSS), 1-6, 2011, Peer-reviwed
    International conference proceedings, English
  • Learning route from beaconing and interest dissemination in vehicular sensor networks
    Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    Proceedings of 2011 6th International Conference on Telecommunication Systems, Services, and Applications, TSSA 2011, 49-54, 2011, Peer-reviwed
    International conference proceedings, English
  • A broadcast path diversity mechanism for delay sensitive VANET safety applications
    Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    IEEE Vehicular Networking Conference, VNC, 171-176, 2011, Peer-reviwed
    International conference proceedings, English
  • OFA: Opportunistic forwarding and acknowledgement for vehicular ad hoc networks
    Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    IB2COM 2011 - 6th International Conference on Broadband Communications and Biomedical Applications, Program, 213-218, 2011, Peer-reviwed
    International conference proceedings, English
  • A Method for Controlling Search in a Pure P2P File Sharing Network
    Hiroaki Nakazawa; Masahiro Yoshida; Satoshi Ohzahata; Akihiro Nakao; Konosuke Kawashima
    Proc. of 8th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT 2010), 6 pages, Jun. 2010, Peer-reviwed
    International conference proceedings, English
  • Controlling File Distribution in The Share Network Through Content Poisoning
    Masahiro Yoshida; Satoshi Ohzahata; Akihiro Nakao; Konosuke Kawashima
    Proc. of AINA 2010, 1004-1011, Apr. 2010, Peer-reviwed
    International conference proceedings, English
  • TCP window control for QoS improvement based on channel occupancy information over wireless LAN
    Keiya Ijiri; Satoshi Ohzahata; Konosuke Kawashima
    IEEE International Conference on Industrial Informatics (INDIN), 1016-1021, 2010, Peer-reviwed
    International conference proceedings, English
  • A TCP Congestion Control Method for Real-Time Communication Based on Channel Occupancy of a Wireless LAN
    Toshiyuki Hirai; Satoshi Ohzahata; Konosuke Kawashima
    2010 16TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC 2010), 153-158, 2010, Peer-reviwed
    International conference proceedings, English
  • An Analysis of the P2P Traffic Characteristics on File Transfers Between Prefectures and Between Autonomous Systems in the Winny Network
    Takashi Koizumi; Masahiro Yoshida; Satoshi Ohzahata; Konosuke Kawashima
    2010 16TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC 2010), 147-152, 2010, Peer-reviwed
    International conference proceedings, English
  • Fuzzy logic based multi-hop broadcast for high-density vehicular ad hoc networks
    Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    2010 IEEE Vehicular Networking Conference, VNC 2010, 17-24, 2010, Peer-reviwed
    International conference proceedings, English
  • Winnyネットワークに対するインデックスポイズニングを用いたファイル流通制御方式
    吉田 雅裕; 大坐畠 智; 中尾 彰宏; 川島 幸之助
    情報処理学会論文誌, 50, 9, 2008-2023, Sep. 2009, Peer-reviwed
    Scientific journal, Japanese
  • Controlling File Distribution in Winny Network Through Index Poisoning
    Masahiro Yoshida; Satoshi Ohzahata; Akihiro Nakao; Konosuke Kawashima
    ICOIN: 2009 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, 210-+, 2009, Peer-reviwed
    International conference proceedings, English
  • A Traffic Control Method with Channel Occupancy Information from MAC Layer in IEEE 802.11
    Hiroshi Nakashima; Satoshi Ohzahata; Konosuke Kawashima
    ICOIN: 2009 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, 220-224, 2009, Peer-reviwed
    International conference proceedings, English
  • A Measurement Study on Peer Behaviors for a Pure P2P Network
    Satoshi Ohzahata; Konosuke Kawashima
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 241-248, 2009, Peer-reviwed
    International conference proceedings, English
  • Adjusting TCP Window Flow Control based on Channel Occupancy Information of IEEE 802.11 Systems
    Kengo Mikoshiba; Satoshi Ohzahata; Konosuke Kawashima
    2009 IEEE 20TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, 1522-1526, 2009, Peer-reviwed
    International conference proceedings, English
  • Fair Bandwidth Assignment to Each Terminal by Adjusting Contention Window Size in Access Point
    Toshihiro Yoshioka; Satoshi Ohzahata; Konosuke Kawashima
    2009 IEEE 20TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, 762-766, 2009, Peer-reviwed
    International conference proceedings, English
  • クライアント/サーバ関係に着目したピュアP2Pアプリケーショントラヒック特定方式と評価
    大坐畠 智; 川島 幸之助
    情報処理学会論文誌, 49, 2, 988-998, Feb. 2008, Peer-reviwed
    Scientific journal, Japanese
  • A Study on Traffic Characteristics Evaluation for a Pure P2P Application
    Satoshi Ohzahata; Konosuke Kawashima
    Proc. the 2nd International Workshop on Modeling, Simulation , and Optimization of Peer-to-Peer Environments (MSOP2P), 483-490, Feb. 2008, Peer-reviwed
    International conference proceedings, English
  • A Performance Evaluation of Wireless Ad Hoc Network based on the Forward Interference Avoidance Concept
    Alain Solheid; Yukihiro, Kamiha; Satoshi Ohzahata; Konosuke Kawashima
    Proc. the 10th International Symposium on Wireless Personal Multimedia Communications (WPMC'07), 5, Dec. 2007, Peer-reviwed
    International conference proceedings, English
  • A Cross-Layer Retransmission Control for Improving TCP Performance in Wireless LAN
    Satoshi Ohzahata; Shigetomo Kimura; Yoshihiko Ebihara; Konosuke Kawashima
    IEICE Transactions on Communications, The Institute of Electronics, Information and Communication Engineers, E90-B, 8, 2070-2080, Aug. 2007, Peer-reviwed, In this paper we propose a cross-layer retransmission control for TCP communication over a wireless link. With our proposed control, a retransmission delay for lost packet is reduced, packet losses in the wireless link are eliminated and all packets are delivered in the correct order. No change is required to TCP itself or to the sender. Our proposed method is implemented in a queue between the media access control (MAC) layer and logical link layer in a base station, and is designed to assist local retransmission control in the MAC layer. Computer simulations show that our proposed method can maximally use the bandwidth of the wireless link under high bit error rates conditions with conventional TCP control. The fairness problem of TCP communication between connections with different bit error rates in a wireless link is also improved, and MAC level fairness is also controllable.
    Scientific journal, English
  • Basic Throughput Evaluation of Wireless Network Employing User Guidance to Hotspot by Advertising through Ad Hoc Network
    Satoshi Ohzahata; Konosuke Kawashima
    Proc. of The 17th Internationa Teletraffic Congress Specialist Seminar, 2, May 2006, Peer-reviwed
    International conference proceedings, English
  • A traffic identification method and evaluations for a pure P2P application
    S Ohzahata; Y Hagiwara; M Terada; K Kawashima
    PASSIVE AND ACTIVE NETWORK MEASUREMENT, PROCEEDINGS, 3431, 55-68, 2005, Peer-reviwed
    Scientific journal, English
  • A pure P2P network size estimation method using network measurements and computer simulation experiments
    S Ohzahata; K Kawashima
    Performance Challenges for Efficient Next Generation Networks, Vols 6A-6C, 6A-6C, 69-78, 2005, Peer-reviwed
    International conference proceedings, English
  • Evaluation of a Queue Management Method for TCP Communications over Multi-hop Wireless Links
    Satoshi Ohzahata; Konosuke Kawashima
    Proc. The Fifth European Wireless Conference Mobile and Wireless Systems beyond 3G (European Wireless 2004), 298-304, Feb. 2004, Peer-reviwed
    International conference proceedings, English
  • A queue management method for improving TCP performance in wireless environments
    S Ohzahata; S Kimura; Y Ebihara; K Kawashima
    2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4, 2, 1069-1074, 2004, Peer-reviwed
    International conference proceedings, English
  • Adaptive Handoff Algorithm for Efficient Network Resource Utilization in Mobile Internet Environments
    Satoshi Ohzahata; Shigetomo Kimura; Yoshihiko Ebihara
    World Scienific Journal of Interconnection Networks, 4, 3, 361-375, Sep. 2003, Peer-reviwed
    Scientific journal, English
  • Adaptive handoff algorithm for efficient network resource utilization
    S Ohzahata; S Kimura; Y Ebihara
    AINA 2003: 17TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 743-748, 2003, Peer-reviwed
    International conference proceedings, English
  • A Fast Authentication Method for Secure and Seamless Handoff
    Satoshi Ohzahata; Shigetomo Kimura; Yoshihiko Ebihara
    Proc. 16th International Conference on Information Networking, 243-252, Jan. 2002, Peer-reviwed
    International conference proceedings, English
  • A proposal of seamless handoff method for cellular Internet environments
    S Ohzahata; S Kimura; Y Ebihara
    IEICE TRANSACTIONS ON COMMUNICATIONS, E84B, 4, 752-759, Apr. 2001, Peer-reviwed
    Scientific journal, English
  • Soft Handoff Method for Wireless Cellular Real-Time Communications in Mobile IP
    Satoshi Ohzahata; Shigetomo Kimura; Yoshihiko Ebihara
    Proc. 14th International Conference on Information Networking, 4C-2.1-2.6, Jan. 2000, Peer-reviwed
    International conference proceedings, English

MISC

  • Communication Resources Allocation in Multi-Channel In-Car Wireless Networks
    高谷空飛; 山本嶺; 大坐畠智; 細川元気; 國立忠秀
    2022, 電子情報通信学会技術研究報告(Web), 121, 421(CQ2021 100-138), 2432-6380, 202202223940786722
  • Poster Presentation : A Bandwidth Reservation Method According to User Request in Content Centric Network
    遠藤 朝陽; 大坐畠 智; 山本 嶺; 加藤 聰彦
    電子情報通信学会, 26 Oct. 2017, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 117, 262, 43-46, Japanese, 0913-5685, 40021373558, AA11546431
  • A cache control method considering bandwidth reservation content in CCN
    李 智輝; 大坐畠 智; 山本 嶺; 加藤 聰彦
    電子情報通信学会, 07 Sep. 2017, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 117, 204, 85-90, Japanese, 0913-5685, 40021342062, AA11546431
  • A Hybrid Approach for Named Data Networking Based Ad Hoc Routing (ネットワークシステム)
    Minh Ngo Quang; Yamamoto Ryo; Ohzahata Satoshi; Kato Toshihiko
    電子情報通信学会, 07 Sep. 2017, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 117, 204, 97-102, English, 0913-5685, 40021342073, AA11546431
  • Improvement of Confidentiality over Multipath TCP Using Data Scrambling and Path Dispersion
    程 詩涵; 山本 嶺; 大坐畠 智; 加藤 聰彦; 鈴木 信雄
    電子情報通信学会, 28 Aug. 2017, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 117, 185, 105-111, Japanese, 0913-5685, 40021316324, AN1054106X
  • Frame Aggregation Size Selection for Improving IEEE 802.11ac MU-MIMO Downlink Throughput
    森山 友和; 山本 嶺; 大坐畠 智; 加藤 聰彦
    電子情報通信学会, 28 Aug. 2017, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 117, 185, 87-92, Japanese, 0913-5685, 40021316256, AN1054106X
  • プロセス間通信と端末間通信の把握による踏み台追跡 (ライフインテリジェンスとオフィス情報システム)
    今田 寛; 大坐畠 智; 加藤 聰彦
    電子情報通信学会, 11 May 2017, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 117, 24, 29-36, Japanese, 0913-5685, 40021214561
  • A fast and secure payment confirmation method in Bitcoin
    中西 建登; 大坐畠 智; 加藤 聰彦
    電子情報通信学会, 20 Apr. 2017, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 117, 3, 13-18, Japanese, 0913-5685, 40021187260, AA11546431
  • Performance Evaluation of MPTCP under Different Transmission Delay and Insufficient Send/Receive Socket Buffer
    天真 正晶; 山本 嶺; 大坐畠 智; 加藤 聰彦; 鈴木 信雄
    電子情報通信学会, 06 Mar. 2017, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 116, 497, 61-66, Japanese, 0913-5685, 40021161171, AN1054106X
  • An Evaluation of Resource Management Method of CCN for Serving QoS
    趙 ハン; 大坐畠 智; 加藤 聰彦
    電子情報通信学会, 02 Mar. 2017, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 116, 484, 1-6, Japanese, 0913-5685, 40021158399, AA11546431
  • An Efficient Pseudo-Multicast Method for Streaming Content Delivery with Cached Network Coding Pieces
    井上 裕太; 大坐畠 智; 加藤 聰彦
    電子情報通信学会, 02 Mar. 2017, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 116, 484, 293-296, Japanese, 0913-5685, 40021159297, AA11546431
  • Experimental analysis on impacts to TCP throughput of power save mode in IEEE 802.11n wireless LAN
    小林 健人; 橋本 善季; 野元 祐孝; 山本 嶺; 大坐畠 智; 加藤 聰彦
    電子情報通信学会, 24 May 2016, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 116, 62, 39-44, Japanese, 0913-5685, 40020849857, AN1054106X
  • Evaluation of Improving Cause-and-effect Relationships among Multi-hop Wireless Ad-hoc Network for Parallel Network Emulation
    山崎 佑典; 大坐畠 智; 加藤 聰彦
    電子情報通信学会, 19 May 2016, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 116, 45, 13-18, Japanese, 0913-5685, 40020848757, AN10013072
  • B-7-13 Optimizing P2P Network Hierarchies for Visual Analytics
    Wu Hsiang-Yun; Takahashi Shigeo; Miyamura Hiroko N.; Ohzahata Satoshi; Nakao Akihiro
    The Institute of Electronics, Information and Communication Engineers, 01 Mar. 2016, Proceedings of the IEICE General Conference, 2016, 2, 146-146, Japanese, 110010038027, AN10471452
  • B-7-14 Network Graph Layout with a Hierarchical Optimization Technique
    Nakamura Miyamura Hiroko; Wu Hsiang-Yun; Takahashi Shigeo; Ohzahata Satoshi; Nakao Aihiro
    The Institute of Electronics, Information and Communication Engineers, 01 Mar. 2016, Proceedings of the IEICE General Conference, 2016, 2, 147-147, Japanese, 110010038028, AN10471452
  • BS-3-13 Analyzing the Traffic Correlation-Based Attacks on Tor(BS-3. Advanced Networking Technologies for Innovative Information Networks)
    Kale Timothy Girry; Ohzahata Satoshi; Wu Celimuge; Kato Toshihiko
    The Institute of Electronics, Information and Communication Engineers, 01 Mar. 2016, Proceedings of the IEICE General Conference, 2016, 2, "S-36"-"S-37", English, 110010038480, AN10471452
  • B-11-18 Impacts of power saving mode of 802.11n WLAN to TCP small queues
    Kobayashi Kento; Hashimoto Yoshiki; Nomoto Masataka; Yamamoto Ryo; Ohzahata Satoshi; Kato Toshihiko
    The Institute of Electronics, Information and Communication Engineers, 01 Mar. 2016, Proceedings of the IEICE General Conference, 2016, 2, 398-398, Japanese, 110010038279, AN10471452
  • B-11-15 Inferring TCP Congestion Control Algorithm Using One Way Packet Logs
    Yongxialee Leelianou; Yamamoto Ryo; Ohzahata Satoshi; Kato Toshihiko
    The Institute of Electronics, Information and Communication Engineers, 01 Mar. 2016, Proceedings of the IEICE General Conference, 2016, 2, 395-395, Japanese, 110010038276, AN10471452
  • Suppressing Selfish Transmission with Extending NAV and Resetting CW in Consideration of Fairness of Upstream/Downstream for Wireless LAN
    笹川 隆; 大坐畠 智; 加藤 聰彦
    電子情報通信学会, 21 Jan. 2016, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 115, 404, 7-12, Japanese, 0913-5685, 40020737544, AA11546431
  • Performance comparison between a hybrid DCF/TDMA QoS scheme and the pure TDMA approach (コミュニケーションクオリティ)
    Lin Jing; WU Celimuge; OHZAHATA Satoshi
    電子情報通信学会, 21 Jan. 2016, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 115, 408, 13-18, English, 0913-5685, 40020737141, AN1054106X
  • Improving Traffic Load Distribution for Tor Network (情報ネットワーク)
    Kale Timothy Girry; Ohzahata Satoshi; Wu Celimuge
    電子情報通信学会, 15 Oct. 2015, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 115, 252, 29-34, English, 0913-5685, 40020651042, AN10013072
  • Improving Cause-and-effect Relationships of Parallel Emulation for Multi-hop Wireless Ad-hoc Network
    山崎 佑典; 大坐畠 智; 加藤 聰彦
    電子情報通信学会, 15 Oct. 2015, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 115, 251, 73-78, Japanese, 0913-5685, 40020650518, AA11546431
  • Reducing Congestion in the Tor Network with Circuit Switching
    Kale Timothy Girry; Satoshi Ohzahata; Celimuge Wu; Toshihiko Kato
    The Tor network is a distributed circuit-switching overlay network, which provides anonymous communication by using voluntarily running onion routers around the world. Tor is vulnerable to network congestion and performance problems because circuit traffics with different rates are competing to transfer their data through a single TCP connection. A large fraction of available network capacity is consumed by the bulk users' traffic, resulting in increasing delays for the light interactive users. The unfair distribution between the circuit traffics of bulk and light users are contributing to bottleneck in the Tor routers. This problem increases the end-to-end latency and reduces the quality of communication in Tor, which discourages many users from using and joining the network. As a result, the degradation of Tor performance does not only affect the users' experience, but also degrade the anonymity of Tor. In this work, we discovered that the current Tor design encountered problems from several performance and deployment issues relating to lower network capacity. To improve the problems in Tor, we applied the circuit switching method and addressed the short-comings of limited network capacity, by connecting the congested OR to higher bandwidth ORs. The proposed method is evaluated on our setup testbed environment and partly in the live Tor network. The experimental results showed that TCP socket buffers and Tor network capacity are better utilized and the overall end-to-end latency is reduced.\n------------------------------This is a preprint of an article intended for publication Journal ofInformation Processing(JIP). This preprint should not be cited. Thisarticle should be cited as: Journal of Information Processing Vol.23(2015) No.5 (online)DOI http://dx.doi.org/10.2197/ipsjjip.23.589------------------------------The Tor network is a distributed circuit-switching overlay network, which provides anonymous communication by using voluntarily running onion routers around the world. Tor is vulnerable to network congestion and performance problems because circuit traffics with different rates are competing to transfer their data through a single TCP connection. A large fraction of available network capacity is consumed by the bulk users' traffic, resulting in increasing delays for the light interactive users. The unfair distribution between the circuit traffics of bulk and light users are contributing to bottleneck in the Tor routers. This problem increases the end-to-end latency and reduces the quality of communication in Tor, which discourages many users from using and joining the network. As a result, the degradation of Tor performance does not only affect the users' experience, but also degrade the anonymity of Tor. In this work, we discovered that the current Tor design encountered problems from several performance and deployment issues relating to lower network capacity. To improve the problems in Tor, we applied the circuit switching method and addressed the short-comings of limited network capacity, by connecting the congested OR to higher bandwidth ORs. The proposed method is evaluated on our setup testbed environment and partly in the live Tor network. The experimental results showed that TCP socket buffers and Tor network capacity are better utilized and the overall end-to-end latency is reduced.\n------------------------------This is a preprint of an article intended for publication Journal ofInformation Processing(JIP). This preprint should not be cited. Thisarticle should be cited as: Journal of Information Processing Vol.23(2015) No.5 (online)DOI http://dx.doi.org/10.2197/ipsjjip.23.589------------------------------, 15 Sep. 2015, 情報処理学会論文誌, 56, 9, English, 1882-7764, 170000130711, AN00116647
  • Suppressing Selfish Transmission with Extending NAV Period and Resetting CW size for Wireless LAN
    笹川 隆; 大坐畠 智; 加藤 聰彦
    電子情報通信学会, 03 Sep. 2015, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 115, 210, 45-50, Japanese, 0913-5685, 40020617324, AN10013072
  • Improving bufferbloat problem of TCP communication by MAC transmission limitation at IEEE 802.11n access point
    野元 祐孝; 策力木格; 大坐畠 智
    電子情報通信学会, 01 Sep. 2015, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 115, 206, 113-118, Japanese, 0913-5685, 40020617271, AN1054106X
  • BS-6-18 Improving Tor Performance with Dynamic Circuit Switching(BS-6.Network and service Design, Control and Management)
    Kale Timothy Girry; Ohzahata Satoshi; Wu Celimuge; Kato Toshihiko
    The Institute of Electronics, Information and Communication Engineers, 25 Aug. 2015, Proceedings of the Society Conference of IEICE, 2015, 2, "S-50"-"S-51", English, 110009984256, AN10489017
  • BS-3-5 A scheduling method considering cached pieces for the content distribution system using overhearing
    Ogasawara Masaru; Ohzahata Satoshi; Kato Toshihiko
    The Institute of Electronics, Information and Communication Engineers, 25 Aug. 2015, Proceedings of the Society Conference of IEICE, 2015, 2, "S-5", Japanese, 110009984231, AN10489017
  • B-18-6 Providing collision-free access for QoS flows in ad hoc networks
    Lin Jing; Wu Celimuge; Ohzahata Satoshi; Kato Toshihiko
    The Institute of Electronics, Information and Communication Engineers, 25 Aug. 2015, Proceedings of the Society Conference of IEICE, 2015, 2, 340-340, English, 110009984188, AN10489017
  • An Efficient Time Slot Allocation Scheme for QoS flows in Ad Hoc Networks (スマートファシリティ研究会・スマートグリッド、スマートシティ/スマートコミュニティに関する技術動向)
    Lin Jing; Wu Celimuge; Ohzahata Satoshi
    電気学会, 18 Jun. 2015, 電気学会研究会資料. SMF = The papers of Technical Meeting on Smart Facilities, IEE Japan, 2015, 6, 31-36, English, 40020650898, AA1267322X
  • An Efficient Time Slot Allocation Scheme for QoS flows in Ad Hoc Networks (情報ネットワーク)
    Lin Jing; Wu Celimuge; Ohzahata Satoshi
    電子情報通信学会, 18 Jun. 2015, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 115, 95, 43-48, English, 0913-5685, 40020523163, AN10013072
  • Inter-vehicle Communications : Research Challenges & Opportunities (無線通信システム) -- (特集セッション 将来無線通信に適した無線アクセス及びネットワーク技術)
    WU Celimuge; OHZAHATA Satoshi; JI Yusheng
    電子情報通信学会, 21 May 2015, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 115, 43, 21-26, English, 0913-5685, 40020491821, AN10060822
  • A NAV Period Control and CW Control of an AP for Keeping Transmission Opportunity from Selfish Terminal in Wireless LAN
    笹川 隆; 大坐畠 智; 加藤 聰彦
    電子情報通信学会, 14 May 2015, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 115, 26, 95-97, Japanese, 0913-5685, 40020492140
  • Implementation of a Bandwidth Control Method for Content-Centric Network
    KUWAYAMA Tomoya; OHZAHATA Satoshi; KATO Toshihiko
    Recently, CCN (Content-Centric Network) that reduces redundant traffic using caches on network nodes attracts much attention. CCN is desighed veiwpoint of "does not care where source of content is," but clients expect a certain level of QoS during content retrieval. It's necessary to guarantee communication quality in order to solve the problem. In this research, we propose a network resource reservation method for CCN with QoS. The proposed method implement control packet to reserve network resource or to release bandwidth by expanding Interest/Data packet, and CCN router reserve network resource by prefix of content ID., The Institute of Electronics, Information and Communication Engineers, 02 Mar. 2015, IEICE technical report, 114, 477, 535-539, Japanese, 0913-5685, 110010018721, AA11546431
  • BS-3-7 Improving Tor Network Throughput by the Circuit Switching(BS-3. Advanced Technologies in the Design, Management and Control for Future Innovative Communication Network)
    Girry Kale Timothy; Ohzahata Satoshi; Wu Celimuge; Kato Toshihiko
    The Institute of Electronics, Information and Communication Engineers, 24 Feb. 2015, Proceedings of the IEICE General Conference, 2015, 2, "S-22"-"S-23", English, 110009928708, AN10471452
  • B-11-19 Multihop Ad-hoc Networking for Smart Garage : Experiment and Results
    An Ruijian; Wu Celimuge; Yu Dong; Ji Yusheng; Ohzahata Satoshi; Kato Toshihiko
    In this paper, we introduce a communication system for Smart Garage. The system connects the intelligent vehicles to the local server with multi-hop ad-hoc communication. The throughput of the ad-hoc communication is evaluated by the real-world experiments conducted both in the indoor environment and in the SUPER GT 2014 contests., The Institute of Electronics, Information and Communication Engineers, 24 Feb. 2015, Proceedings of the IEICE General Conference, 2015, 2, 436-436, English, 110009928632, AN10471452
  • Common Service Platform for Electric Vehicles
    WEI Jing; LI Jinglin; LIU Zhihan; WU Celimuge; OHZAHATA Satoshi; KATO Toshihiko
    We propose a common service platform for electric vehicles (EVs). The platform is supposed to make use of information of EVs, EVs users, traffic flow, map and charging network to provide common service such as GIS service, resource management service, billing service, and open API service for EVs users, charging service operators and service developers. We divide the platform into three layers, which are resource layer, capability layer and service layer. Resource layer is to store data, and provide data access interface to capability layer. Capability layer encapsulates some common function, and provides the function to service layer. Meanwhile, capability layer will authorize and authenticate the invoking services. Service layer provides common service for platform users. Service developers can use open API of capability layer to organize new customized service. We describe our demo implementation of the proposed platform framework., The Institute of Electronics, Information and Communication Engineers, 22 Jan. 2015, Technical report of IEICE. CQ, 114, 404, 1-6, English, 0913-5685, 110010002156, AN1054106X
  • Consideration on iOS TCP Performance Problem at Busty Packet Losses
    Wang Weikai; WU Celimuge; OHZAHATA Satoshi; KATO Toshihiko
    Recently, packet losses can be caused by transmission interruptions such as handoffs in the mobile networks and protection switching in the transport networks. These packet losses are bursty because the transmission interruptions continue for tens of miliseconds through several seconds. Previously, we performed the experimental analysis for various TCP versions running on Linux and MAC OS, and found that, although TCPs in Linux recover from bursty losses quickly, TCP in OS X shows an intermittent data transfer during the timeout retransmission invoked by bursty losses, which takes several seconds for retransmitting all of the lost packets. In this paper, we give detailed results of experimental analysis. Based on this analysis, we clarify the reason for the intermittent data transfer in MAC OS X by taking account of newly introduced TCP procedures, such as F-RTO and Early Retransmit., The Institute of Electronics, Information and Communication Engineers, 22 Jan. 2015, Technical report of IEICE. CQ, 114, 404, 19-24, English, 0913-5685, 110010002159, AN1054106X
  • A Routing Protocol for Drive-thru Internet Access in Delay Tolerant Vehicular Ad Hoc Networks
    OHYA Yoshimasa; WU Celimuge; OHZAHATA Satoshi; KATO Toshihiko
    We propose a routing protocol for drive-thru Internet access in delay tolerant vehicular networks. The contribution of this paper is two-folds. First, we propose a new approach which utilizes the concept of delay tolerant network (DTN) to supplement the conventional communication approach. Second, we propose an algorithm to schedule DTN transmissions in order to maximize the system throughput. The proposed protocol is able to attain higher TCP throughput than the conventional approach by providing more efficient wireless resource utilization. We use computer simulations to evaluate the proposed protocol., The Institute of Electronics, Information and Communication Engineers, 22 Jan. 2015, Technical report of IEICE. CQ, 114, 404, 85-89, English, 0913-5685, 110010002171, AN1054106X
  • Performance Evaluation of Qos Supporting Ad Hoc Scheme Combining TDMA and 802.11 DCF
    Lin Jing; WU Celimuge; OHZAHATA Satoshi; KATO Toshihiko
    We present performance evaluation results of a QoS supporting ad hoc network protocol which employs a hybrid approach utilizing both TDMA and 802.11 DCF. In the protocol, TDMA period provides contention free transmissions for QoS flows, and DCF period is used to provide contention-based access for best effort or low priority flows. TDMA time slots are assigned on admission basis in a distributed manner by utilizing network routing information and considering current assignment situation. In DCF period, frames are transmitted without disturbing the TDMA period. We evaluate the protocol for various numbers of best effort flows with QualNet simulator. Simulation results show that the protocol is able to provide an efficient solution for QoS control in ad hoc networks by combing TDMA and 802.11 DCF., The Institute of Electronics, Information and Communication Engineers, 22 Jan. 2015, Technical report of IEICE. CQ, 114, 404, 35-40, English, 0913-5685, 110010002162, AN1054106X
  • Poster Session : A Network Resource Management Method for Content-Centric Network with QoS
    KUWAYAMA Tomoya; OHZAHATA Satoshi; KATO Toshihiko
    Recently, CCN (Content-Centric Network) that reduces redundant traffic using caches on network nodes attracts much attention. CCN is desighed veiwpoint of "does not care where source of content is," but clients expect a certain level of QoS during content retrieval. It's necessary to guarantee communication quality in order to solve the problem. In this research, we propose a network resource management method for CCN with QoS. In the proposed method, End-to-End resource reservation is not needed by utilizing the content caches., The Institute of Electronics, Information and Communication Engineers, 16 Oct. 2014, IEICE technical report, 114, 252, 55-58, Japanese, 0913-5685, 110009958939, AA11546431
  • A Design of Circuit Switching Method for Reducing Congestion in the Tor Network
    Girry Kale Timothy; Ohzahata Satoshi; Wu Celimuge; Kato Toshihiko
    The Tor network is a distributed circuit-switching overlay network, and consists of voluntarily run onion routers around the world. Tor is vulnerable to network congestion and performance problems, due to circuit traffics with different rates are competing to transfer their data on a single TCP connection. A large fraction of available network capacity is consumed by the bulk users' traffic, resulting in increasing delays for the light interactive users. The unfair distribution of circuit traffic makes a bottleneck in Tor output buffer. We apply the circuit switching method and make the OR to construct a multiple TCP connections to improve the traffic flow rate and reduce the congestion in the Tor network. This approach increase the OR capacity and fairly distributing the multiple traffics that are competing to send data. The proposed method was evaluated on our setup ORs that are online in the Tor network. The experimental results show that TCP socket buffers and Tor network capacity are utilized and circuit congestion is reduced., The Institute of Electronics, Information and Communication Engineers, 16 Oct. 2014, IEICE technical report, 114, 252, 87-92, English, 0913-5685, 110009958945, AA11546431
  • Piece Distribution Scheduling for Streaming with Pseudo-Multicast in Wireless LAN
    KANAYAMA Akihiro; OHZAHATA Satoshi; KATO Toshihiko
    In a Wireless LAN environment, the waiting time of downloading streaming contents through unicast becomes longer because the bandwidth is shared among the users. Then, Pseudo-Multicast with content piecing is promising because of the flexibility. Applying Pseudo-Multicast to streaming delivery, scheduling of piece and terminal to send is important. Therefore we studied and proposed effective scheduling methods through experiments of testbed., The Institute of Electronics, Information and Communication Engineers, 11 Sep. 2014, IEICE technical report, 114, 206, 97-102, Japanese, 0913-5685, 110009945616, AA11546431
  • Characterization of TCP Congestion Control Algorithm by Estimating Congestion Window : Increase Relation and Decrease Parameter
    Oda Atsushi; Wu Celimuge; Ohzahata Satoshi; Kato Toshihiko
    Recently, according to the diversification of network environments, a lot of TCP congestion control mechanisms have been introduced. Since the congestion control algorithms affect the performance of the Internet, it is important to analyze which algorithms are used widely. This paper proposes a passive scheme to characterize individual congestion control algorithms by (1) estimating congestion window at round-trip time intervals, (2) correlating window sizes and their increases, and (3) identifying the discrete coefficient of congestion window. Our scheme aims at dealing with many of recent proposed congestion control algorithms including TCP Vegas, TCP Veno, Cubic TCP and TCP Illinois., The Institute of Electronics, Information and Communication Engineers, 11 Sep. 2014, Technical report of IEICE. CQ, 114, 209, 171-176, Japanese, 0913-5685, 110009950367, AN1054106X
  • B-11-10 A Multi-hop Broadcast Protocol for WAVE Multi-channel Single-radio Vehicular Networks
    Wu Celimuge; Ohzahata Satoshi; Ji Yusheng; Kato Toshihiko
    The Institute of Electronics, Information and Communication Engineers, 09 Sep. 2014, Proceedings of the Society Conference of IEICE, 2014, 2, 241-241, English, 110009883573, AN10489017
  • BS-6-19 Measuring output buffer utilization for Interactive Users in Tor(BS-6.Network and service Design, Control and Management)
    KALE Timothy Girry; OHZAHATA Satoshi; CELIMUGE Wu; KATO Toshihiko
    The Institute of Electronics, Information and Communication Engineers, 09 Sep. 2014, Proceedings of the Society Conference of IEICE, 2014, 2, "S-72"-"S-73", English, 110009883792, AN10489017
  • Performance Analysis of a Content Distribution Method using File Piecing and Overhearing for Wireless Multi-hop Network
    NISHIZAKA Kazuaki; OHZAHATA Satoshi; KATO Toshihiko
    In wireless LAN, since the bandwidth is shared with terminals, the throughput is reduced when the same content is downloaded by plural terminals. Therefore, we have proposed a method for content distribution in wireless LAN which achieve faster downloads by combining file piecing and pseudo-multicast which is overhearing packets of the same content for other terminals. When applying this method in the wireless multi-hop network, improvement of the piece distrubution efficiency by collecting the frames from the different hops. However, in the multi-hop situation, the overheared frames have to be delt adequently for packet loss and disorder deliverly because that the overhearing terminals extract the pieces by matching the sequence number of TCP segments. To handle the problems, we improve a byte steam management method in the overhearing node to get peaces from the overhearing efficiently. The proposed method is evaluated in testbed., The Institute of Electronics, Information and Communication Engineers, 29 Jul. 2014, IEICE technical report. MoNA, Mobile network and applications, 114, 160, 57-62, Japanese, 0913-5685, 110009945830, AA12618946
  • A Study on QoS Support in Ad Hoc Networks Using TDMA and 802.11 DCF
    Lin Jing; WU Celimuge; OHZAHATA Satoshi; KATO Toshihiko
    We propose a QoS supporting ad hoc network protocol, which employs a hybrid approach utilizing both TDMA and 802.11 DCF. TDMA period provides contention free transmissions for QoS flows, and DCF period is used to provide contention-based access for best effort or low priority flows. TDMA time slots are assigned on admission basis in a distributed manner by utilizing network routing information and considering current assignment situation. In DCF period, frames are transmitted not to disturb the TDMA period. By combing TDMA and 802.11 DCF, the proposed ad hoc network is able to provide an efficient solution for QoS control in ad hoc networks. We use QualNet simulator to evaluate the proposed scheme., The Institute of Electronics, Information and Communication Engineers, 10 Jul. 2014, Technical report of IEICE. CQ, 114, 131, 25-30, English, 0913-5685, 110009942500, AN1054106X
  • Improving cause-and-effect relationships among single-hop neighbors of wireless network in distributed emulation
    NITTA Koji; OHZAHATA Satoshi; KATO Toshihiko
    In distributed emulator, emulation processes are divided into Logical Processes (LPs), and each LP can be processed in parallel. To obtain the same result as performing emulation with sequential processing, synchronization is needed among LPs. In wireless LAN emulation, the both of the MAC-Layer retransmission times and the collision events cannot be synchronized among terminals (LPs), contradiction occur among LPs. In this paper, we propose a method to correct a cause-and-effect relationship among terminals for the collision and the retransmission times in MAC, and implement the proposed method in EMANE. We evaluate the proposed method and discuss its scalability., The Institute of Electronics, Information and Communication Engineers, 29 May 2014, IEICE technical report. ASN, Ambient intelligence and sensor networks, 114, 65, 7-12, Japanese, 0913-5685, 110009902436, AA12618979
  • Improving cause-and-effect relationships among single-hop neighbors of wireless ad-hoc network in distributed emulation
    新田 幸司; 大坐畠 智; 加藤 聰彦
    In emulation environment, packets have to be delivered from sender to receiver in real-time. For a scalable emulation, distributed and parallel emulators have been developed. In distributed emulator EMANE, emulation is divided into Logical Processes(LPs), and each LP can process in parallel. To obtain the same result as performing emulation with sequential processing synchronization is needed among LPs. In WLAN emulation with EMANE, the both of the MAC-Layer retransmission times and the collision events cannot be synchronized among terminals (LPs), contradiction occur among LPs. In this paper, we propose a method to correct a cause-and-effect relationship among terminals for the collision and the retransmission times in MAC. We evaluate the proposed method and constructed environments scalability in the emulation., The Institute of Electronics, Information and Communication Engineers, 14 Mar. 2014, IEICE technical report. MoNA, Mobile network and applications, 113, 495, 125-130, Japanese, 0913-5685, 110009861145, AA12618946
  • Improving cause-and-effect relationships among single-hop neighbors of wireless ad-hoc network in distributed emulation
    Koji Nitta; Satoshi Ohzahata; Toshihiko Kato
    In emulation environment, packets have to be delivered from sender to receiver in real-time. For a scalable emulation, distributed and parallel emulators have been developed. In distributed emulator EMANE, emulation is divided into Logical Processes(LPs), and each LP can process in parallel. To obtain the same result as performing emulation with sequential processing synchronization is needed among LPs. In WLAN emulation with EMANE, the both of the MAC-Layer retransmission times and the collision events cannot be synchronized among terminals (LPs), contradiction occur among LPs. In this paper, we propose a method to correct a cause-and-effect relationship among terminals for the collision and the retransmission times in MAC. We evaluate the proposed method and constructed environments scalability in the emulation., Information Processing Society of Japan (IPSJ), 07 Mar. 2014, 研究報告ユビキタスコンピューティングシステム(UBI), 2014, 30, 1-6, Japanese, 0919-6072, 110009676792, AA11838947
  • Improving cause-and-effect relationships among single-hop neighbors of wireless ad-hoc network in distributed emulation
    Koji Nitta; Satoshi Ohzahata; Toshihiko Kato
    In emulation environment, packets have to be delivered from sender to receiver in real-time. For a scalable emulation, distributed and parallel emulators have been developed. In distributed emulator EMANE, emulation is divided into Logical Processes(LPs), and each LP can process in parallel. To obtain the same result as performing emulation with sequential processing synchronization is needed among LPs. In WLAN emulation with EMANE, the both of the MAC-Layer retransmission times and the collision events cannot be synchronized among terminals (LPs), contradiction occur among LPs. In this paper, we propose a method to correct a cause-and-effect relationship among terminals for the collision and the retransmission times in MAC. We evaluate the proposed method and constructed environments scalability in the emulation., Information Processing Society of Japan (IPSJ), 07 Mar. 2014, IPSJ SIG technical reports, 2014, 30, 1-6, Japanese, 0919-6072, 110009676739, AA11851388
  • A NAV Period Control and CW Control of an Access Point for Keeping Transmission Opportunity and Achieving Fairness in Wireless LAN
    HAYAMI Ryunosuke; OHZAHATA Satoshi; KATO Toshihiko
    In this paper, we propose a dynamic NAV control method to suppress excessive traffic of EDCA terminal that generates TCP or UDP traffic with small contention window size in case that EDCA terminals and DCF terminals coexists in the same AR In the propose method, two kind of the fake period are prepared to increase the downstream traffic of AP. We also adapt appropriate size of CW_ for AP to ensure opportunity of downstream transmission with reducing collision between an upload frame and a download frame. We evaluate performance of the proposed method by simulation experiments, and show that the proposed methods achieves fairness between upstream and downstream of the proposed terminals., The Institute of Electronics, Information and Communication Engineers, 06 Mar. 2014, IEICE technical report, 113, 472, 561-566, Japanese, 0913-5685, 110009861557, AA11546431
  • B-18-36 Extending Content Delivery Method of Overhearing for Wireless Multi-hop Network
    Nishizaka Kazuaki; Ohzahata Satoshi; Kato Toshihiko
    The Institute of Electronics, Information and Communication Engineers, 04 Mar. 2014, Proceedings of the IEICE General Conference, 2014, 2, 604-604, Japanese, 110009849941, AN10471452
  • BS-1-15 Towards Improving Congestion Control in Tor(BS-1. Future Network Technologies for Advanced Information and Communications Society)
    Girry Kale Timothy; Ohzahata Satoshi; Wu Celimuge; Kato Toshihiko
    The Institute of Electronics, Information and Communication Engineers, 04 Mar. 2014, Proceedings of the IEICE General Conference, 2014, 2, "S-29", English, 110009850012, AN10471452
  • B-7-63 A Stabilization Method of Streaming Distribution in Wireless LAN with Overhearing
    Kanayama Akihiro; Ohzahata Satoshi; Kato Toshihiko
    The Institute of Electronics, Information and Communication Engineers, 04 Mar. 2014, Proceedings of the IEICE General Conference, 2014, 2, 238-238, Japanese, 110009850243, AN10471452
  • B-11-18 A Cross Layer Approach for Multi-hop Broadcasting in VANETs with Reserved Time Slots
    Wu Celimuge; Ohzahata Satoshi; Kato Toshihiko
    The Institute of Electronics, Information and Communication Engineers, 04 Mar. 2014, Proceedings of the IEICE General Conference, 2014, 2, 466-466, English, 110009850368, AN10471452
  • Behavior Analysis of Different TCP Implementations under Burst Error Environment
    Wang Weikai; KATO Toshihiko; WU Celimuge; OHZAHATA Satoshi
    Currently, large amount of data are transferred through the Internet. TCP plays an important role in this data transfer for the reliable data delivery. On the other hand, recent transmission technologies and media access control technologies realize high quality of data transmission in both backbone transport networks and mobile telecommunication networks. Therefore, packet losses detected in TCP level are considered as an indication of network congestion. However, packet losses can be caused by transmission interruptions such as handoffs in the mobile networks and protection switching in the transport networks. These packet losses are bursty because the transmission interruptions continue for tens of mili seconds through several seconds. This paper describes the results of experimental analysis of various TCP versions, several TCP versions in the Linux, that in Mac OS, against bursty packet losses. The result for Mac OS has some problem in retransmitting contiguously lost packets. This paper shows a detailed packet level analysis of TCP behaviors and points out that the key is the retransmission invoked by TCP SACK option., The Institute of Electronics, Information and Communication Engineers, 24 Jan. 2014, Technical report of IEICE. CQ, 113, 405, 17-22, English, 0913-5685, 110009822172, AN1054106X
  • An Evaluation of Node-Based Delays in the Tor Network
    Girry Kale Timothy; Ohzahata Satoshi; Wu Celimuge; Kato Toshihiko
    The Tor Network is a low-latency anonymity and censorship resistance network, which relaying traffics through onion routers before being forwarded to the destination. The distribution of trust offered by Tor creates resilience in the face of compromise and censorship; however, there are performance and usability issues in the Tor network. In this paper, we analyze in more details the delay contributions from different components that cause delays in the Tor nodes. We measured the application packet that passes through all the relay nodes and closely compute the sources of latency. The experimental analysis shows that the delays occurring on relay nodes are caused by the heavy circuit queuing, TCP kernel memory exhaustion and TCP advertised window not able to accept more data. We present our experimental detail analysis and measurement results as a prerequisite for addressing the Tor's poor performance and usability., The Institute of Electronics, Information and Communication Engineers, 23 Jan. 2014, IEICE technical report. Information networks, 113, 389, 121-126, English, 0913-5685, 110009825115, AN10013072
  • Improving optimistic unchoke for reducing cross-ISP traffic of BitTorrent
    ETO Hisashi; OHZAHATA Satoshi; KATO Toshihiko
    In BitTorrent, network consist of overlay network on IP network. Therefore, even if peer wants a piece that exists in the same AS, the peer may get the piece from the outside AS. This behavior causes redundant traffic, and becomes burden for ISPs. In the peer selection algorithm, each peer randomly selects a peer with the optimistic unchoke every thirty seconds from its peer list We improve the optimistic unchoke to reduces the cross-AS traffic in this paper. The proposed method uses original Tit-for-tat strategy to keep fairness between an uploader and a downloader, but we modify the optimistic unchoke to reduce the redundant traffic across ASes., The Institute of Electronics, Information and Communication Engineers, 23 Jan. 2014, IEICE technical report. Information networks, 113, 389, 127-132, Japanese, 0913-5685, 110009825116, AN10013072
  • A NAV Period Control for Keeping Transmission Opportunity and Achieving Fairness in Wireless LAN
    HAYAMI Ryunosuke; OHZAHATA Satoshi; KATO Toshihiko
    In this paper, we propose a extended dynamic NAV control method to suppress excessive traffic of EDCA terminal with small contention window size in case that EDCA terminals and DCF terminals coexists in the same AP. In the propose method, two patterns of the fake period are prepared to increase the downstream traffic of AP. We also adapt small size of CW_ for AP to ensure opportunity of downstream transmission with reducing collision between an upload frame and a download frame. We evaluate performance of the proposed method by simulation experiments, and show that the proposed methods achieves fairness between upstream and downstream of the proposed terminals., The Institute of Electronics, Information and Communication Engineers, 23 Jan. 2014, IEICE technical report. Information networks, 113, 389, 115-120, Japanese, 0913-5685, 110009825114, AN10013072
  • The Effect of Node-Based Delays on Tor Performance
    Girry Kale Timothy; Ohzahata Satoshi; Wu Celimuge; Kato Toshihiko
    Tor is an anonymous network that provides privacy and anonymity to users all over the world, by relaying traffics through the three onion routers before being forwarded to the destination. In this paper, we show that Tor suffers from the performance issues, because bandwidth is limited to how much a user is willing to allocate for Tor's usage. This scenario frequently leads to increasing delays that are not tolerated by the average end-users. We discuss these delays in more detail and perform the comprehensive study to evaluate the relative contributions for delays in the node. We use a simple model to analyze the delay components that contribute to degrade the Tor performance, due to poor TCP congestion control and high traffic queuing in the buffers. We evaluate our proposed mathematical models and present our experimental results as a prerequisite for addressing the Tor's poor delay performance., The Institute of Electronics, Information and Communication Engineers, 17 Oct. 2013, IEICE technical report, 113, 244, 111-116, English, 0913-5685, 110009783040, AA11546431
  • Improving VANET unicast routing protocols by using network coding and cooperative relays
    WU Celimuge; OHZAHATA Satoshi; JI Yusheng; KATO Toshihiko
    We present a scheme for VANET routing protocols. The scheme uses multiple forwarder nodes to forward data and uses network coding to reduce the number of required transmissions, resulting in a significant improvement in end-to-end packet delivery ratio with low message overhead. The scheme can be used with any VANET routing protocols by simple modification. The effectiveness of the scheme is evaluated by using both theoretical analysis and computer simulations., The Institute of Electronics, Information and Communication Engineers, 17 Oct. 2013, IEICE technical report. Information networks, 113, 245, 13-18, English, 0913-5685, 110009818863, AN10013072
  • Peer cooperation for accelerating piece diffusion and localization in BitTorrent
    ETO Hisashi; OHZAHATA Satoshi; KATO Toshihiko
    In Bit Torrent, network consist of overlay network on IP network. Therefore, even if peer wants a piece that exists in the same AS, the peer may get the piece from the outside AS. This behavior causes redundant traffic, and becomes burden for ISPs. In the peer selection algorithm, each peer selects randomly select a peer with the optimistic unchoke every thirty seconds from its peer list. In this paper, we improve the optimistic unchoke to reduces the cross-AS traffic. The proposed method uses original Tit-for-tat strategy to keep fairness between an uploader and a downloader, but we modify the optimistic unchoke to reduce the redundant traffic across A Ses., The Institute of Electronics, Information and Communication Engineers, 10 Oct. 2013, IEICE technical report, 113, 244, 73-74, Japanese, 110009783031, AA11546431
  • Improvement of TCP Delay Performance at Large Rate Change in IEEE 802.11n Wireless LANs
    NOMOTO Masataka; KATO Toshihiko; WU Celimuge; OZAHATA Satoshi
    IEEE 802.11n wireless LANs provide high-speed data transfer. If the radio condition becomes bad, however, the transfer rate will be reduced significantly and there will be some problems in the data transfer. So, we have evaluated the performance of IEEE 802.11n LAN by changing the distance between the access point and a station. As a result, a severe increase of round-trip time was measured in the case of low transfer rate. A reason for this increased round-trip delay will be powerful retransmission function of 802.11n. So, we propose a method to improve TCP delay performance by reducing this retransmission capability and by generating TCP segment loss intentionally., The Institute of Electronics, Information and Communication Engineers, 12 Sep. 2013, Technical report of IEICE. CQ, 113, 208, 75-80, Japanese, 0913-5685, 110009814864, AN1054106X
  • BS-7-10 A Backbone-based Multi-hop Broadcast Protocol for VANETs
    Wu Celimuge; Ohzahata Satoshi; Kato Toshihiko
    The Institute of Electronics, Information and Communication Engineers, 03 Sep. 2013, Proceedings of the Society Conference of IEICE, 2013, 2, "S-51"-"S-52", English, 110009730227, AN10489017
  • BS-7-50 A Simple Modeling for Delay Analysis of the Tor Network
    KALE Timothy Girry; OHZAHATA Satoshi; KATO Toshihiko
    The Institute of Electronics, Information and Communication Engineers, 03 Sep. 2013, Proceedings of the Society Conference of IEICE, 2013, 2, "S-128"-"S-129", English, 110009730267, AN10489017
  • Improving a cause-and-effect relationship in a distributed emulation environment for wireless ad-hoc network
    NITTA Koji; OHZAHATA Satoshi; KATO Toshihiko
    In this paper, we construct an emulation environment for wireless ad-hoc network with EMANE. In the emulation environment, since a collision of frame is not dealt in the distributed emulation, we propose a method to correct a cause-and-effect relationship for the collision and the retransmission times in MAC. We evaluate the proposed method in the emulation environment., The Institute of Electronics, Information and Communication Engineers, 18 Jul. 2013, IEICE technical report, 113, 129, 173-178, Japanese, 0913-5685, 110009777836, AA11546431
  • A Fuzzy Inference Intelligent Routing Protocol for Vehicular Ad Hoc Networks
    WU Celimuge; OHZAHATA Satoshi; KATO Toshihiko
    Due to vehicle movement, limited wireless resources and lossy feature of wireless channels, providing a reliable multi-hop communication in VANETs is particularly challenging. We present a VANET routing protocol which learns the optimal route by employing a fuzzy constraint Q-Learning algorithm. The protocol uses fuzzy logic to evaluate a wireless link is whether good or not by considering multiple metrics of signal strength, available bandwidth and relative vehicle movement. Based on the evaluation of each wireless link, the protocol learns the best route using the route request messages and hello messages. The protocol can achieve high packet delivery ratio and low end-to-end delay. We show the effectiveness of the protocol by using computer simulations., The Institute of Electronics, Information and Communication Engineers, 17 Jul. 2013, IEICE technical report. ASN, Ambient intelligence and sensor networks, 113, 132, 201-206, English, 0913-5685, 110009778122, AA12618979
  • An Implementation-friendly Broadcast Protocol for VANETs Utilizing Neighbor Information
    WU Celimuge; OHZAHATA Satoshi; KATO Toshihiko
    We present BR-NB (broadcast with neighbor information), a fuzzy logic based multi-hop broadcast protocol for VANETs. BR-NB achieves a low overhead by using only a subset of neighbor nodes to relay data packets. For the relay node selection, BR-NB takes account of the inter-vehicle distance, vehicle mobility and link quality by employing fuzzy logic. The expected coverage and vehicle mobility are inferred from the two-hop neighbor information which can be acquired from the hello message exchange. Since it is independent of lower layers and does not require GPS, BR-NB provides an implementation-friendly solution for broadcasting in VANETs. We use computer simulations and real-world experiments to evaluate the performance of BR-NB., The Institute of Electronics, Information and Communication Engineers, 11 Jul. 2013, Technical report of IEICE. CQ, 113, 123, 7-12, English, 0913-5685, 110009773226, AN1054106X
  • A Redundant Traffic Elimination Method with using Overhearing in Wireless LAN
    YOKOSE Hiroaki; NITTA Koji; OHZAHATA Satoshi; KATO Toshihiko
    In wireless LAN, since the bandwidth is shared with the terminals, the download speed is reduced even if the same content is downloaded. We have proposed a download acceleration method for content distribution by overhearing packets of the same content for other nodes in wireless LAN. Since parts of the content are obtained by the overhearing, the download time is reduced. In the method, the content is divided into pieces and the server distributes them. We show scheduling methods of pieces to send and destination with applying network coding, and evaluated these methods in testbed., The Institute of Electronics, Information and Communication Engineers, 16 May 2013, IEICE technical report. ASN, Ambient intelligence and sensor networks, 113, 38, 35-40, Japanese, 0913-5685, 110009771441, AA12618979
  • A NAV Period Control for Suppressing Excessive Traffic from Terminals in Wireless LAN
    Ryunosuke Hayami; Satoshi Ohzahata; Toshihiko Kato
    There is a problem that DCF terminal transmits low rate when EDCA terminals and DCF terminals coexists in the same AP because EDCA terminal occupies the channel more than that of DCF terminals. In this paper, we propose a dynamic NAV control method that adds a fake period not to overlap the contention period with the EDCA terminals, and Backoff control is also considered to enhance in the fake scheme to improve the problem., Information Processing Society of Japan (IPSJ), 09 May 2013, 研究報告ユビキタスコンピューティングシステム(UBI), 2013, 37, 1-2, Japanese, 0919-6072, 110009579753, AA11838947
  • A Redundant Traffic Elimination Method with using Overhearing in Wireless LAN
    Hiroaki Yokose; Koji Nitta; Satoshi Ohzahata; Toshihiko Kato
    In wireless LAN, since the bandwidth is shared with the terminals, the download speed is reduced even if the same content is downloaded. We have proposed a download acceleration method for content distribution by overhearing packets of the same content for other nodes in wireless LAN. Since parts of the content are obtained by the overhearing, the download time is reduced. In the method, the content is divided into pieces and the server distributes them. We show scheduling methods of pieces to send and destination with applying network coding, and evaluated these methods in testbed., Information Processing Society of Japan (IPSJ), 09 May 2013, 研究報告ユビキタスコンピューティングシステム(UBI), 2013, 7, 1-6, Japanese, 0919-6072, 110009579723, AA11838947
  • A NAV Period Control for Suppressing Excessive Traffic from Terminals in Wireless LAN
    HAYAMI Ryunosuke; OHZAHATA Satoshi; KATO Toshihiko
    There is a problem that DCF terminal transmits low rate when EDCA terminals and DCF terminals coexists in the same AP because EDCA terminal occupies the channel more than that of DCF terminals. In this paper, we propose a dynamic NAV control method that adds a fake period not to overlap the contention period with the EDCA terminals, and Backoff control is also considered to enhance in the fake scheme to improve the problem., The Institute of Electronics, Information and Communication Engineers, 09 May 2013, IEICE technical report. ASN, Ambient intelligence and sensor networks, 113, 38, 149-150, Japanese, 110009771463, AA12618979
  • Measuring Available Bandwidth for Path Selection of Tor Network
    KALE Timothy Girry; OHZAHATA Satoshi; KATO Toshihiko
    The Tor routing protocol aimed at providing anonymity for latency-sensitive applications such as web-browsing by routing traffic through a randomly-constructed circuit of intermediate relays. Previous studies showed that the barriers to widespread use of Tor are the unfairly load distribution and the low TCP throughput. We consider the available bandwidth metric as important for path selection to keep the TCP throughput and distribution of traffics across the Tor network. Then, we have studied the key attributes that degrade the Tor's performance, and introduced the adaptation measurement technique in Tor by applying the active network measurement. This measurement technique is useful to determine the available bandwidth on selected relays., The Institute of Electronics, Information and Communication Engineers, 18 Apr. 2013, IEICE technical report. Information networks, 113, 5, 49-54, English, 0913-5685, 110009768581, AN10013072
  • A MAC protocol to improve QoS in VANETs using contention window adjustment
    WU Celimuge; OHZAHATA Satoshi; KATO Toshihiko
    Packet delivery ratio and end-to-end delay are the two most important QoS (Quality of Service) metrics. In this paper, we propose a MAC layer protocol which can provide a high packet delivery ratio and low end-to-end delay for various scenarios. The proposed protocol uses a Q-Learning algorithm to tune the contention window size in order to provide an efficient channel access scheme for various network situations. We show the effectiveness of the proposed protocol by using computer simulations., The Institute of Electronics, Information and Communication Engineers, 18 Apr. 2013, Technical report of IEICE. CQ, 113, 7, 65-70, English, 0913-5685, 110009769138, AN1054106X
  • A Dynamic NAV Period Control for High Priority Media Access Control in Wireless LAN
    KUMAGAI Yuta; OHZAHATA Satoshi; KATO Toshihiko
    A policy of QoS control in wireless LAN is important in case that a terminal of Voice category of IEEE 802.11e generates excessive traffic. In this paper, we propose a dynamic NAV control, Dynamic cwmin control for an access point(AP)and queuing method, even if the high priority terminals and the proposed terminals coexist. In the proposed method a fake period is added to conventional NAV period to control priority, and Dynamic CWmin control and adaptive queuing controls are added to AP. Then the proposed method archives fairness among terminals even when excessive uplink traffic is generated. We evaluate performance of the proposed method by simulation experiments, and show that the proposed methods serves controlled priority., The Institute of Electronics, Information and Communication Engineers, 14 Mar. 2013, Ad hoc networks IEICE technical report, 112, 494, 131-136, Japanese, 0913-5685, 110009712612, AA12214856
  • Visualization of Overlay Network using Autonomous System Relationships
    Nakamura Miyamura Hiroko; Hu Hsiang-Yun; Yoshida Masahiro; Ohzahata Satoshi; Nakao Akihiro; Takahashi Shigeo
    This report presents a method for visualizing scale-free networks. Scale-free networks are said to be difficult to analyze and visualize, because distribution of the vertex degrees follow the power-law nature. Sasaki et al proposed scale-free network visualization technique that creates the hierarchical representation, referring to their vertex degrees. By using the AS relations data, we improve the method of Sasaki et al, and visualize the scale-free networks more clearly. We also applied the proposed method to overlay traffic data of BitTorrent in order to demonstrate the effective visualization of communication paths between a pair of peers over the scale-free network., The Institute of Electronics, Information and Communication Engineers, 07 Mar. 2013, IEICE technical report, 112, 463, 577-582, Japanese, 0913-5685, 110009712168, AA11546431
  • Encouragement Talk : A Piece Scheduling Method for a Content Distribution Method using File Piecing and Overhearing in Wireless LAN
    YOKOSE Hiroaki; OHZAHATA Satoshi; KATO Toshihiko
    In wireless LAN, since the bandwidth is shared with the terminals, the download speed is reduced even if the same content is downloaded. We have proposed a download acceleration method for content distribution by overhearing packets of the same content for other nodes in wireless LAN. Since parts of the content are obtained by the overhearing, the download time is reduced. In the method, the content is divided into pieces and the server distributes them/We show scheduling methods of pieces to send and destination with applying network coding, and evaluated these methods in testbed., The Institute of Electronics, Information and Communication Engineers, 07 Mar. 2013, IEICE technical report, 112, 463, 25-30, Japanese, 0913-5685, 110009712073, AA11546431
  • A Dynamic NAV Period Control for High Priority Media Access Control in Wireless LAN
    熊谷 雄太; 大坐 畠智; 加藤 聰彦
    無線 LAN 環境での通信の課題の一つとして QoS 制御をどのように行うかという問題がある.本稿では,IEEE 802.11e の Vo カテゴリーのような高優先制御で大量のトラヒックを生成する端末が混在した場合でも NAV の動的な変更,AP の CWmin の動的な変更,キューイング制御を組み合わせることで提案方式の端末の通信の QoS 確保を基地局主導で実現する制御方式を提案する.NAV に通信状況で動的に変更する値 (Fake 期間) を追加し,優先度の調整を行い従来の優先端末の過剰な通信を抑え,提案端末の通信量を増加させる.また,キューイングと動的 CW の変更を行うことで,下りトラヒックの割合を増加させ,端末間の公平性を達成する.提案方式の性能をコンピュータシミュレーションにより評価し,提案方式を用いることで既存の優先端末の通信量を抑え,提案方式の端末の通信量が向上していることを示す.A policy of QoS control in wireless LAN is important in case that a terminal of Voice category of IEEE 802.11e generates excessive traffic. In this paper, we propose a dynamic NAV control, Dynamic CWmin control for an access point(AP) and queuing method, even if the high priority terminals and the proposed terminals coexist. In the proposed method a fake period is added to conventional NAV period to control priority, and Dynamic CWmin control and adaptive queuing controls are added to AP. Then the proposed method archives fairness among terminals even when excessive uplink traffic is generated. We evaluate performance of the proposed method by simulation experiments, and show that the proposed methods serves controlled priority., 07 Mar. 2013, 研究報告ユビキタスコンピューティングシステム(UBI), 2013, 21, 1-6, Japanese, 110009551481, AA11838947
  • B-6-59 An Implementation-friendly Multi-hop Broadcast Protocol for VANETs
    Wu Celimuge; Ohzahata Satoshi; Kato Toshihiko
    The Institute of Electronics, Information and Communication Engineers, 05 Mar. 2013, Proceedings of the IEICE General Conference, 2013, 2, 59-59, English, 110009760983, AN10471452
  • A Network Emulation Evaluation for a Redundant Traffic Elimination Method using File Piecing and Overhearing in Wireless LAN
    NITTA Koji; YOKOSE Hiroaki; OHZAHATA Satoshi; KATO Toshihiko
    In wireless LAN, since the bandwidth is shared with the terminals, the download speed is reduced even if the same content is downloaded We propose a download acceleration method for content distribution by overhearing packets of the same content for other nodes in wireless LAN Since parts of the content are obtained by the overhearing, the download time is reduced In the proposed method, the content is divided into pieces and the server distributes them with considering download status of the receivers The proposed method can accelerate the download speed even if terminals start downloading at different timing In this paper, we evaluate the proposed method in network emulator, and analyzed differences between testbed and emulator We also evaluate effects when the number of nodes is increased, The Institute of Electronics, Information and Communication Engineers, 24 Jan. 2013, Ad hoc networks IEICE technical report, 112, 405, 31-36, Japanese, 0913-5685, 110009727308, AA12214856
  • Applying Network Coding to a Redundant Traffic Elimination Method using File Piecing and Overhearing in Wireless LAN
    YOKOSE Hiroaki; OHZAHATA Satoshi; KATO Toshihiko
    In wireless LAN, since the bandwidth is shared with the terminals, the download speed is reduced even if the same content is downloaded. We have proposed a download acceleration method for content distribution by overhearing packets of the same content for other nodes in wireless LAN. Since parts of the content are obtained by the overhearing, the download time is reduced. In the method, the content is divided into pieces and the server distributes them.We apply network coding for sending pieces in the method when terminals request different pieces to improve speed, and we evaluated the proposed method in testbed., The Institute of Electronics, Information and Communication Engineers, 13 Dec. 2012, IEICE technical report, 112, 350, 139-144, Japanese, 0913-5685, 110009666960, AA11546431
  • A NAV Period Control for High Prioritized Channel Access in Wireless LAN
    KUMAGAI Yuta; OHZAHATA Satoshi; KATO Toshihiko
    There is a problem how to QoS control in wireless LAN. In this paper, we perpose a dynamic NAV control method, even if a high priority terminal (conventional IEEE802.11 Vo category) and DCF terminal are coexisted. In the proposed method a fake value is added to NAV period to control priority of the channel access. Under the proposed control, the conventional high priority terminal has to wait an additional time of the fake period than the proposed terminal to start t the carrier sense. However, the proposed terminal start the carrier sense earlier the conventional high priority terminal because the terminals under the proposed control know NAV includes the fake period. We evaluate performance of the proposed method by simulation experiments, and show that the proposed methods are given higher priority., The Institute of Electronics, Information and Communication Engineers, 14 Nov. 2012, IEICE technical report. Information networks, 112, 307, 63-68, Japanese, 0913-5685, 110009641655, AN10013072
  • Improving OLSR for highly mobile and lossy networks
    DASHBYAMBA Narangerel; WU Celimuge; OHZAHATA Satoshi; KATO Toshihiko
    Optimized Link State Routing Protocol (OLSR) is a well-known proactive, routing protocol for mobile ad hoc networks. OLSR reduces the number of control messages by using MPRs to forward topology control messages as compared with typical proactive protocols. Since OLSR does not consider the node mobility and signal strength condition in the MPR selection, OLSR cannot work well in a highly mobile and lossy network. In this paper, we propose a protocol to improve OLSR by considering the node mobility and signal strength in the route selection. We use network simulator to evaluate the proposed protocol's performance., The Institute of Electronics, Information and Communication Engineers, 08 Nov. 2012, Technical report of IEICE. CQ, 112, 288, 47-52, English, 0913-5685, 110009642101, AN1054106X
  • An Evaluation of Piece Scheduling for a Redundant Traffic Elimination using File Piecing and Overhearing in Wireless LAN
    YOKOSE Hiroaki; OHZAHATA Satoshi; KATO Toshihiko
    In wireless LAN, since the bandwidth is shared with the terminals, the download speed is reduced even if the same content is downloaded. We propose a download acceleration method for content distribution by overhearing packets of the same content for other nodes in wireless LAN. Since parts of the content are obtained by the overhearing, the download time is reduced. In the proposed method, the content is divided into pieces and the server distributes them. We propose a piece scheduling to be fair download speed with considering download status of the receivers even if the receivers start download at different times or the receivers are under different communication conditions. We evaluated the scheduling of the proposed method., The Institute of Electronics, Information and Communication Engineers, 03 Oct. 2012, IEICE technical report. Information networks, 112, 230, 191-196, Japanese, 0913-5685, 110009636559, AN10013072
  • Fuzzy logic based MPR selection for OLSR
    DASHBYAMBA N.; WU Celimuge; OHZAHATA Satoshi; KATO Toshihiko
    Optimized Link State Routing Protocol(OLSR) provides a low control overhead in high-density networks by using only MPRs to forward topology control messages. Since signal strength and mobility i \ssues are not considered in the MPR selection, OLSR fails to work properly in lossy or mobile wireless networks. In this paper, we propose a fuzzy logic based MPR selection algorithm to improve the performance of OLSR. The proposed protocol selects MPRs by considering inter-node distance, RSSI and node velocity. We use computer simulations to evaluate the proposed protocol., The Institute of Electronics, Information and Communication Engineers, 27 Sep. 2012, IEICE Technical Report, 112, 218, 83-88, English, 0913-5685, 110009666597, AN1054106X
  • BS-5-27 Eliminating Redundant Traffic with File Piecing and Overhearing for Contents Distribution over Wireless LAN(BS-5. Network and Service Design, Control and Management)
    Yokose Hiroaki; Ohzahata Satoshi; Kato Toshihiko
    The Institute of Electronics, Information and Communication Engineers, 28 Aug. 2012, Proceedings of the Society Conference of IEICE, 2012, 2, "S-78"-"S-79", English, 110009592120, AN10489017
  • B-7-42 A Dynamic NAV Period Control Method for QoS Control in Wireless LAN
    KUMAGAI Yuta; OHZAHATA Satoshi; KATO Toshihiko
    The Institute of Electronics, Information and Communication Engineers, 28 Aug. 2012, Proceedings of the Society Conference of IEICE, 2012, 2, 121-121, Japanese, 110009591758, AN10489017
  • B-6-18 A Redundant Transmission Mechanism for WSNs
    Wu Celimuge; Ohzahata Satoshi; Kato Toshihiko
    The Institute of Electronics, Information and Communication Engineers, 28 Aug. 2012, Proceedings of the Society Conference of IEICE, 2012, 2, 18-18, English, 110009591655, AN10489017
  • An Evaluation of a Redundant Traffic Elimination Method for Wireless LAN using File Piecing and Overhearing under Different Transfer Rate Conditions
    YOKOSE Hiroaki; OHZAHATA Satoshi; KATO Toshihiko
    In wireless LAN, since the bandwidth is shared with the terminals, the download speed is reduced even if the same content is downloaded. We propose a download acceleration method for content distribution by overhearing packets of the same content for other nodes in wireless LAN. Since parts of the content are obtained by the overhearing, the download time is reduced. In the proposed method, the content is divided into pieces and the server distributes them with considering download status of the receivers. We evaluated the proposed method under the condition that terminals are communicating in different transfer rate., The Institute of Electronics, Information and Communication Engineers, 12 Jul. 2012, IEICE technical report, 112, 131, 1-6, Japanese, 0913-5685, 110009625782, AA11546431
  • Fast and reliable data collection in WSNs with adaptive redundant transmission
    WU Celimuge; OHZAHATA Satoshi; KATO Toshihiko
    For many wireless sensor network (WSN) applications, high reliability and low delay are required. The acknowledgement based retransmission mechanism is the most frequently used approach for providing the reliability. However, the retransmission increases the end-to-end delay especially when the number of hops from a sensor to the sink node is large. In this paper, we propose a redundancy-based approach to provide high reliability and low end-to-end delay. Redundant transmissions are used when a link is unreliable or the end-to-end delay requirement is strict. We evaluate the proposed mechanism using a wireless sensor network which consists of IRIS motes., The Institute of Electronics, Information and Communication Engineers, 05 Jul. 2012, Technical report of IEICE. CQ, 112, 119, 95-100, English, 0913-5685, 110009626641, AN1054106X
  • A Method for Eliminating Redundant Traffic using Piece Dividing and Overhearing
    横瀬 広明; 大坐畠 智; 加藤 聰彦
    無線 LAN において同一のコンテンツを多数の端末が同時にダウンロードすると,同じ内容が各端末に宛ててそれぞれ送信されるため冗長であり,ダウンロードの速度も低下する.本稿では,他の端末あての無線フレームを互いにオーバヒアリングし,まだ所持していないコンテンツの一部分を入手することで冗長なトラヒックを削減し,ダウンロード速度を向上させる方式を提案する.コンテンツはピースに分割して管理し,コンテンツ配信サーバが各端末のピースのダウンロード状況をもとに送信宛先端末や送信ピースを決定する.実機を用いた実験を行い,提案方式が冗長トラヒックを削減しスループットを向上させること,ダウンロード開始のタイミングが端末ごとに異なる場合でも有効であることを示す.In wireless LAN, since the bandwidth is shared with the terminals, the download speed is reduced even if the same content is downloaded. We propose a download acceleration method for content distribution by overhearing packets of the same content for other nodes in wireless LAN. Since parts of the content are obtained by the overhearing, the download time is reduced. In the proposed method, the content is divided into pieces and the server distributes them with considering download status of the receivers. We developed a testbed and confirmed that the proposed method accelerates the download speed even if terminals start downloading at different timing., 14 May 2012, 研究報告モバイルコンピューティングとユビキタス通信(MBL), 2012, 9, 1-6, Japanese, 170000070978, AA11851388
  • A Method for Eliminating Redundant Traffic using Piece Dividing and Overhearing
    YOKOSE Hiroaki; OHZAHATA Satoshi; KATO Toshihiko
    In wireless LAN, since the bandwidth is shared with the terminals, the download speed is reduced even if the same content is downloaded. We propose a download acceleration method for content distribution by overhearing packets of the same content for other nodes in wireless LAN. Since parts of the content are obtained by the overhearing, the download time is reduced. In the proposed method, the content is divided into pieces and the server distributes them with considering download status of the receivers. We developed a testbed and confirmed that the proposed method accelerates the download speed even if terminals start downloading at different timing., The Institute of Electronics, Information and Communication Engineers, 14 May 2012, IEICE technical report, 112, 44, 45-50, Japanese, 0913-5685, 110009569087, AA1154676X
  • A VANET routing protocol with full utilization of opportunism
    WU Celimuge; OHZAHATA Satoshi; KATO Toshihiko
    Opportunistic routing can be a solution for data forwarding in vehicular ad hoc networks (VANETs). However, existing opportunistic protocols specify the forwarding nodes at the sender side and therefore the opportunism cannot be fully utilized. Most opportunistic routing protocols cannot provide a high reliability due to the lack of efficient packet reception check mechanism. In this paper, we present OFA, an opportunistic forwarding and acknowledgement protocol for VANETs. In OFA, the forwarder node selection occurs at receiver nodes. An intermediate node is selected opportunistically to acknowledge the sender on the behalf the forwarder node when the forwarder node cannot communicate with the sender node directly. OFA can fully utilize the path diversity and also can provide hop-by-hop reliability., The Institute of Electronics, Information and Communication Engineers, 12 Apr. 2012, Technical report of IEICE. CQ, 112, 10, 19-24, English, 110009564453, AN1054106X
  • A PU Aware Route Discovery Approach for Cognitive Ad Hoc Networks (アドホックネットワーク)
    Wu Celimuge; Ohzahata Satoshi; Kato Toshihiko
    電子情報通信学会, 12 Mar. 2012, 電子情報通信学会技術研究報告 : 信学技報, 111, 477, 147-152, English, 0913-5685, 40019224950
  • B-6-14 A Primary User Aware Routing Protocol for Cognitive CSMA/CA Ad Hoc Networks
    Nakato Tatsuaki; Wu Celimuge; Ohzahata Satoshi; Kato Toshihiko
    The Institute of Electronics, Information and Communication Engineers, 06 Mar. 2012, Proceedings of the IEICE General Conference, 2012, 2, 14-14, English, 110009462487, AN10471452
  • A PU Aware Route Discovery Approach for Cognitive Ad Hoc Networks
    Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    Cognitive ad hoc networks have been attracting interests in recent years. Designing an efficient routing protocol for cognitive ad hoc networks is important for full utilization of free wireless resources. A protocol considering primary user (PU) flows and channel assignment incurred network connectivity issue in the route selection is still missing. In this paper, we propose AODV-cog, a cognitive routing protocol for CSMA/CA ad hoc networks based on AODV. AODV-cog utilizes the availability of multiple channels by considering the effect on the primary users. AODV-cog chooses a route by considering available channel bandwidth and future channel utilization. AODV-cog switches channels for secondary user flows when network congestion is occurred. We use network simulations to show the advantage of AODV-cog over existing alternatives.Cognitive ad hoc networks have been attracting interests in recent years. Designing an efficient routing protocol for cognitive ad hoc networks is important for full utilization of free wireless resources. A protocol considering primary user (PU) flows and channel assignment incurred network connectivity issue in the route selection is still missing. In this paper, we propose AODV-cog, a cognitive routing protocol for CSMA/CA ad hoc networks based on AODV. AODV-cog utilizes the availability of multiple channels by considering the effect on the primary users. AODV-cog chooses a route by considering available channel bandwidth and future channel utilization. AODV-cog switches channels for secondary user flows when network congestion is occurred. We use network simulations to show the advantage of AODV-cog over existing alternatives., 05 Mar. 2012, 研究報告ユビキタスコンピューティングシステム(UBI), 2012, 9, 1-6, English, 170000069867, AA11838947
  • A PU Aware Route Discovery Approach for Cognitive Ad Hoc Networks
    Celimuge Wu; Satoshi Ohzahata; Toshihiko Kato
    Cognitive ad hoc networks have been attracting interests in recent years. Designing an efficient routing protocol for cognitive ad hoc networks is important for full utilization of free wireless resources. A protocol considering primary user (PU) flows and channel assignment incurred network connectivity issue in the route selection is still missing. In this paper, we propose AODV-cog, a cognitive routing protocol for CSMA/CA ad hoc networks based on AODV. AODV-cog utilizes the availability of multiple channels by considering the effect on the primary users. AODV-cog chooses a route by considering available channel bandwidth and future channel utilization. AODV-cog switches channels for secondary user flows when network congestion is occurred. We use network simulations to show the advantage of AODV-cog over existing alternatives.Cognitive ad hoc networks have been attracting interests in recent years. Designing an efficient routing protocol for cognitive ad hoc networks is important for full utilization of free wireless resources. A protocol considering primary user (PU) flows and channel assignment incurred network connectivity issue in the route selection is still missing. In this paper, we propose AODV-cog, a cognitive routing protocol for CSMA/CA ad hoc networks based on AODV. AODV-cog utilizes the availability of multiple channels by considering the effect on the primary users. AODV-cog chooses a route by considering available channel bandwidth and future channel utilization. AODV-cog switches channels for secondary user flows when network congestion is occurred. We use network simulations to show the advantage of AODV-cog over existing alternatives., 05 Mar. 2012, 研究報告モバイルコンピューティングとユビキタス通信(MBL), 2012, 9, 1-6, English, 170000069825, AA11851388
  • A Multilevel Graph Layout for Analysing Large-scale Network Datasets
    MIYAMUYA NAKAMURA Hiroko; YOSHIDA Yoshihiro; OHZAHATA Satoshi; TAKAHASHI Shigeo; NAKAO Akihiro; KAWASHIMA Konosuke
    We propose a multilevel graph layout technique for visualizing large scale file-sharing network datasets. Large-scale datasets are said to be difficult to analyze and visualize. However, with our technique, the datasets can be displayed in multistep. For instance the outline of network dataset is shown first, and when focused on a certain region, the detailed information is shown as well. By using this technique, users can observe a large scale dataset from the outline to the detail seamlessly, and therefore this is valuable for the structural analysis of network datasets., The Institute of Electronics, Information and Communication Engineers, 01 Mar. 2012, IEICE technical report, 111, 468, 243-248, Japanese, 0913-5685, 110009545036, AA11546431
  • Visualizing Scale Free Networks for the Analysis of P2P Network Traffic Data
    SASAKI Kai; WU Hsiang-Yun; YOSHIDA Yoshihiro; MIYAMURA NAKAMURA Hiroko; OHZAHATA Satoshi; NAKAO Akihiro; TAKAHASHI Shigeo
    This report presents a method for visualizing scale-free networks including P2P networks as an typical example. Visualizing large-scale and complicated networks such as social networks has recently been very popular while conventional network visualization techniques cannot allow us to understand the topological structure of the scale-free networks. This is because the vertex degrees vary at an exponential rate in the scale-free network and thus special attention should be given when visualizing the network connectivity and analyzing the network traffic there. In this report, we employ the hierarchical representation of the scale-free network by referring to their vertex degrees, so that we can clearly visualize the topological structure of the network in 3D space and retrieve the traffic paths over the network. We also applied the proposed method to BitTorrent traffic data in order to demonstrate that we can effectively visualize communication paths between a pair of peers over the scale-free network., The Institute of Electronics, Information and Communication Engineers, 01 Mar. 2012, IEICE technical report, 111, 468, 249-254, Japanese, 0913-5685, 110009545037, AA11546431
  • Detailed Analysis of iPad2 TCP Behaviours
    WANG Weikai; WU Celimuge; OHZAHATA Satoshi; KATO Toshihiko
    Nowadays, tablet device such as iPad2 is getting popular as a platform for portable wireless computing and is used in various communication scenarios, such as web browsing and e-mail transmissions. However, iPad2 is newly introduced in the market and it may possibly have some differences form the common notebook computers. So, we analyze the behaviors of iPad2 TCP communication, which works as a basis of various communication applications. In this analysis, we examine the TCP communication in various conditions by introducing transmission errors. We analyze the segment sequences in detail. This paper shows the evaluation results and points out some issues which iPad2 has in its TCP implementation., The Institute of Electronics, Information and Communication Engineers, 26 Jan. 2012, IEICE technical report. Information networks, 111, 409, 95-100, English, 0913-5685, 110009481034, AN10013072
  • A High Speed Contents Distribution Method with Overhearing File Pieces in Wireless LAN
    横瀬 広明; 大坐畠 智; 加藤 聰彦
    電子情報通信学会, 19 Jan. 2012, 電子情報通信学会技術研究報告 : 信学技報, 111, 385, 89-94, Japanese, 0913-5685, 40019153409
  • A TCP Window Control using Channel Occupancy for Improving Video Streaming Quality at Wireless LAN Terminal
    HIRAI Toshiyuki; OHZAHATA Satoshi; WADA Naoya; KAWASHIMA Konosuke
    In TCP communication, each terminal tries to obtain as much bandwidth as possible. This control causes the differences of transfer rates among terminals and disrupts the video stream service. In order to solve this problem, we propose a new TCP window size control method using the channel occupancy for a wireless network. Our method is intended to fairly share the bandwidth among the terminals. Each terminal controls the maximum TCP window size not to generate excessive traffic. We confirmed that the proposed method improves the quality of video communication by computer simulation experiments., The Institute of Electronics, Information and Communication Engineers, 15 Dec. 2011, IEICE technical report, 111, 344, 19-24, Japanese, 0913-5685, 110009466628, AA11546431
  • Joint Retransmission and Relay Node Selection Scheme for Multi-hop Broadcast in VANETs
    WU Celimuge; OHZAHATA Satoshi; KATO Toshihiko
    Providing a reliable and efficient multi-hop broadcast in vehicular ad hoc networks (VANETs) is crucial for Intelligent Transportation Systems. In order to provide a high reliability, a retransmission mechanism is required because a packet can be lost depending on the wireless link status and vehicle movement. The retransmission can significantly increase the message overhead if the relay nodes are not selected properly. The solution involves a joint consideration of retransmission and relay node selection. In this paper, we present a broadcast scheme which provides a high reliability with a low overhead. The scheme uses a fuzzy logic based approach to select relay nodes and uses a lightweight retransmission mechanism to retransmit a packet when a relay fails. We use computer simulations to evaluate the performance of the scheme and show the simulation results., The Institute of Electronics, Information and Communication Engineers, 03 Nov. 2011, Technical report of IEICE. CQ, 111, 278, 79-84, English, 0913-5685, 110009465887, AN1054106X
  • A Study on TCP Performance of Android Tablet Devices
    WU Celimuge; WANG Weikai; OHZAHATA Satoshi; KATO Toshihiko
    Tablet devices are expected to account for a large portion of the Internet traffic in the near future due to their increasing shipments. As an open source platform, Android has been attracting interests from many communities. In this paper, we analyze the performance of TCP communication on Android tablet devices. We examine the TCP behaviors of Android tablet devices in various conditions by using a network emulator. We show the analysis results and point out possible improvements., The Institute of Electronics, Information and Communication Engineers, 01 Sep. 2011, IEICE technical report, 111, 202, 51-56, English, 0913-5685, 110008900628, AN1054106X
  • B-20-6 An Evaluation of Congestion Control of Wireless Mesh Network Connecting with Wired Network
    NAKAYAMA Yosuke; OHZAHATA Satoshi; KATO Toshihiko
    The Institute of Electronics, Information and Communication Engineers, 30 Aug. 2011, Proceedings of the Society Conference of IEICE, 2011, 2, 471-471, Japanese, 110008725298, AN10489017
  • BS-6-40 A Lightweight Approach for Reliable Broadcast in VANETs(BS-6. Planning, Control and Management on Networks and Services)
    Wu Celimuge; Ohzahata Satoshi; Kato Toshihiko
    The Institute of Electronics, Information and Communication Engineers, 30 Aug. 2011, Proceedings of the Society Conference of IEICE, 2011, 2, "S-108"-"S-109", English, 110008725367, AN10489017
  • Improvement of one-phase pull diffusion using fuzzy logic (アドホックネットワーク)
    Wu Celimuge; Ohzahata Satoshi; Kato Toshihiko
    電子情報通信学会, 15 Jul. 2011, 電子情報通信学会技術研究報告, 111, 139, 1-6, English, 0913-5685, 40018944969
  • Performance analysis of iPad TCP communications
    WANG Weikai; WU Celimuge; OHZAHATA Satoshi; KATO Toshihiko
    Nowadays, a tablet terminal such as iPad is getting popular as a platform of the portable wireless computing and is used in various communication scenarios such as web accesses and e-mail transmissions. However, iPad is newly introduced in the market and it may possibly have some differences from the common wireless terminals such as notebook computers. So, we analyze the performance of iPad TCP communication, which works as a basis of various communication applications. In this analysis, we examine the TCP performance in various conditions by introducing propagation delays and transmission errors. We have analyzed the segment sequences in detail. This paper shows the evaluation results and points out some issues which iPad has in its TCP implementation., The Institute of Electronics, Information and Communication Engineers, 09 Jun. 2011, IEICE technical report, 111, 80, 85-90, English, 0913-5685, 110008746085, AN10013072
  • Controls at an Access Point and Terminals for Video Streaming over Wireless LAN and its QoE Evaluation
    KOYAMA Takayuki; IJIRI Keiya; OHZAHATA Satoshi; KAWASHIMA Konosuke
    In wireless LAN, since an access point is shared by several terminals, there is a problem that communication quality of video streaming is affected by background traffic of TCP. Therefore, we propose priority control for improving quality of video streaming by setting EDCA (Enhanced Distributed Channel Access) parameters in an access point. In addition, we also propose a cross-layer control to adjust the bandwidth, and set TCP window size of TCP from wireless terminals according to the congestion status. In evaluation, we construct the testbed and the proposed method shows improvement of QoE for the video streaming., The Institute of Electronics, Information and Communication Engineers, 28 Feb. 2011, IEICE technical report, 110, 455, 63-68, Japanese, 0913-5685, 110008690055, AN1054106X
  • B-6-83 A Congestion Control Method with Queuing Time for Dynamic CW Control in Wireless Mesh Network
    KOBAYASHI Hirokazui; OHZAHATA Satoshi; KATO Toshihiko
    The Institute of Electronics, Information and Communication Engineers, 28 Feb. 2011, Proceedings of the IEICE General Conference, 2011, 2, 83-83, Japanese, 110008577005, AN10471452
  • B-6-109 A Performance Evaluation of BitTorrent in IP Network Topologies
    MISHINA Tomoyuki; OHZAHATA Satoshi; KATO Toshihiko
    The Institute of Electronics, Information and Communication Engineers, 28 Feb. 2011, Proceedings of the IEICE General Conference, 2011, 2, 109-109, Japanese, 110008577031, AN10471452
  • B-7-3 A QoS Control Scheme at Access Point for Video Streaming to Mobile Terminals
    Koyama Takayuki; Ijiri Keiya; Ohzahata Satoshi; Kawashima Konosuke
    携帯電話で、映像を利用する状況が急増している。無線LANを用いて携帯端末で映像を快適に視聴するためには、ビデオストリーミングによる下り帯域の利用を上りより優先させる必要がある。本稿では、携帯端末からアクセスポイント(AP)におけるIEEE 802.11c規格のEDCA (Enhanced Distributed Channel Access)パラメータを変更することにより、下りトラヒックを優先させる通信速度制御を実現する。, The Institute of Electronics, Information and Communication Engineers, 28 Feb. 2011, Proceedings of the IEICE General Conference, 2011, 2, 167-167, Japanese, 110008577089, AN10471452
  • A Search Control for P2P Networks Focused on Peer Property and Network Structure
    NAKAZAWA Hiroaki; YOSHIDA Masahiro; OHZAHATA Satoshi; NAKAO Akihiro; KAWASHIMA Konosuke
    P2P systems have been used for file sharing, VoIP and video streaming services all over the world. In particular, P2P file sharing systems have various problems such as copyright infringement, personal information leakage. One of the reasons of these problems is that a pure P2P file sharing network does not have a management and control mechanism for file exchange. Our previous study has proposed a file search method by controlling file search network. In this method, the control peers set up a lot of search links to the peers. In this paper, we propose a search control method focused on peer property and network structure. We evaluated effects of our method by computer simulation using measured data set. The results show that the propose method improves the control efficiency., The Institute of Electronics, Information and Communication Engineers, 13 Jan. 2011, IEICE technical report, 110, 373, 49-54, Japanese, 0913-5685, 110008676230, AN10013072
  • An Improvement of QoE for Video Streaming over Wireless LAN Using the Cross Layer Control between the MAC Layer and the TCP Layer
    IJIRI Keiya; OHZAHATA Satoshi; KAWASHIMA Konosuke
    In Wireless LAN's infrastructure mode, several terminals use the same AP (Access Point) to share wireless bandwidth. Terminals making TCP communications will get more and more bandwidth which results in difficulty for the terminals making video streaming to get enough bandwidth. In this paper, we propose a cross layer control algorithm which adjusts the TCP window size adequately by using wireless channel occupancy information. We show that the proposed control scheme improves quality of communication for video streaming by modulating bandwidth for TCP communications. The quality is evaluated by using QoE (Quality of Experience) assessment techniques based on the ITU-T J.247., The Institute of Electronics, Information and Communication Engineers, 09 Dec. 2010, IEICE technical report, 110, 339, 155-160, Japanese, 0913-5685, 110008675460, AA11546431
  • A multi-hop broadcast protocol for driver assistance in high-density environments
    WU Celimuge; OHZAHATA Satoshi; KATO Toshihiko
    Recently, as a component of Intelligent Transportation Systems (ITS), vehicular ad hoc networks have been rapidly attracting interests for the driver assistance systems. In this paper, we propose a multi-hop broadcast protocol for information dissemination in high-density environments. The proposed protocol redues redundant broadcast messages by means of using only a subset of neighbor nodes to relay messages. In the relay node selection, the proposed protocol considers multiple metrics of inter-vehicle distance, node mobility and signal strength, and integrates them by introducing the fuzzy logic. The effectiveness of the proposed protocol is also evaluated by computer simulations., The Institute of Electronics, Information and Communication Engineers, 02 Sep. 2010, Technical report of IEICE. CQ, 110, 198, 37-42, Japanese, 0913-5685, 110008108069, AN1054106X
  • A multi-hop broadcast protocol for driver assistance in high-density environments
    策力木格; 大坐畠 智; 加藤 聰彦
    映像情報メディア学会, Sep. 2010, ITE technical report, 34, 35, 65-70, Japanese, 1342-6893, 40017339510, AN1059086X
  • Adaptive Visualization for Analyzing Large-Scale Network Datasets
    MIYAMUYA NAKAMURA Hiroko; OHZAHATA Satoshi; NAKAO Akihiro; KAWASHIMA Konosuke
    Traditional network visualization techniques have problem that not all data can be displayed at the same time because the file-sharing network data is too large-scale. Therefore, we propose a concept of adaptive network graph display, in which the graph style can be changed according to the details of user's observation. We construct a visualization system based on this concept. When observing data globally, the proposed system selectively displays information based on the clustering result, and when observing data locally, the system displays detailed information., The Institute of Electronics, Information and Communication Engineers, 26 Aug. 2010, IEICE technical report, 110, 190, 103-108, Japanese, 0913-5685, 110008107993, AA11546431
  • A Cross Layer Control of TCP Window in Wireless LAN for QoS Improvement
    IJIRI Keiya; OHZAHATA Satoshi; KAWASHIMA Konosuke
    In wireless LAN environment, QoS (Quality of Service) for real-time communication service such as streaming distribution is deteriorated with simultaneously connected TCP communications. This is because that a termial which communicates by TCP increases its congestion window size until packet loss occurs in the network under the congestion control algorithm of TCP Reno. The terminal for TCP communication uses the bandwidth greedily even if there are some real-time communications being carried over the same wireless channel. In this paper, we propose a cross layer control algorithm which adjusts the window size adequately to guarantee QoS for real-time communication by using wireless channel occupancy information directly from TCP layer. Empirical evaluations show that our method improves QoS for real-time communication., The Institute of Electronics, Information and Communication Engineers, 01 Jul. 2010, IEICE technical report, 110, 118, 81-86, Japanese, 0913-5685, 110007890161, AN1054106X
  • A TCP Congestion Control Method at Wireless LAN Terminal for Improving Real-Time Communication Quality
    HIRAI Toshiyuki; OHZAHATA Satoshi; KAWASHIMA Konosuke
    TCP Reno is often used as congestion control algorithm of TCP. In the congestion control of TCP Reno, the window size is increased until congestion occurs, consequently, quality of the real-time communication may be decreased. To resolve this problem, we propose a TCP congestion control to improve quality of real-time communications with channel occupancy. The channel occupancy is calculated by analyzing the frame size and wireless link speed of IEEE 802.11. Then, the window size is adequately adjusted to the communication situation of wireless LAN. Computer simulation results show that our method improves quality of the real-time communication with TCP communication in the same terminal., The Institute of Electronics, Information and Communication Engineers, 08 Apr. 2010, IEICE technical report, 110, 4, 11-16, Japanese, 0913-5685, 110007863017, AA11546431
  • A Network Visualization System with Interactive Operations for Important Nodes Discovery
    NAKAMURA MIYAMURA Hiroko; OHZAHATA Satoshi; NAKAO Akihiro; KAWASHIMA Konosuke; SUZUKI Yoshio
    電気学会, 08 Mar. 2010, 電気学会研究会資料. IIC, 産業計測制御研究会, 2010, 79, 27-32, Japanese, 10026070304, AN10074226
  • A Topological Analysis and Evaluation for Peer-to-Peer File Sharing Network
    HIRANO Makoto; YOSHIDA Masahiro; OHZAHATA Satoshi; KAWASHIMA Konosuke
    08 Mar. 2010, 全国大会講演論文集, 72, 403-404, Japanese, 110008123238, AN00349328
  • A TCP Congestion Control using Number of Active Wireless Users and Information of Wired Communication Delay
    HIRAI Toshiyuki; OHZAHATA Satoshi; KAWASHIMA Konosuke
    08 Mar. 2010, 全国大会講演論文集, 72, 355-356, Japanese, 110008123215, AN00349328
  • TCP Window Control for QoS Improvement using the MAC Layer Information over Wireless LAN
    IJIRI Keiya; OHZAHATA Satoshi; KAWASHIMA Konosuke
    08 Mar. 2010, 全国大会講演論文集, 72, 353-354, Japanese, 110008123214, AN00349328
  • Terminal Based Fair Bandwidth Assignment with Adjusting Contention Window Size of Access Point
    YOSHIOKA Toshihiro; OHZAHATA Satoshi; KAWASHIMA Konosuke
    Recently, wireless LANs have been used widely. However, there are unfairness problems in wireless LANs. One of which is that a small number of stations (STAs) may obtain a large throughput while other STAs hardly get any bandwidth. This unfairness problem occurs between an upstream flow and a downstream flow because access point(AP) and STAs have the same transmission opportunity by CSMA/CA control. To improve these problems, we proposed a simple method combining the Deficit Round-Robin (DRR) queuing method and a dynamic contention window control in the AP. Also, we estimated channel occupancy by NAV on RTS/CTS. However, in this paper, channel occupancy is estimated by communication that does not use RTS/CTS. The proposed method acheived fairness in throughput per-station which have multiple UDP and TCP flows by computer simulation experiments., The Institute of Electronics, Information and Communication Engineers, 25 Feb. 2010, IEICE technical report, 109, 449, 7-12, Japanese, 0913-5685, 110008000317, AN10013072
  • A Dynamic Index Poisoning Method for A P2P File Sharing Network
    YOSHIDA Masahiro; OHZAHATA Satoshi; NAKAO Akihiro; KAWASHIMA Konosuke
    In recent years, the copyright infringements and malware propagation in P2P file sharing networks have become prevalent. Therefore, an index poisoning method has attracted much attention to prevent illegal file distribution. However, applying an index poisoning method on a large scale P2P file sharing networks is difficult because of the possible bad influence it might have on them. In this paper, we propose a low-load index poisoning method for file distribution control. Our proposed method calculates an appropriate count of dummy metadata to control file distribution sufficiently. And we dynamically control the count of dummy metadata with a PID controller. Finally, we apply the proposed method to the live Winny network and evaluate our method., The Institute of Electronics, Information and Communication Engineers, 25 Feb. 2010, IEICE technical report, 109, 448, 279-284, Japanese, 0913-5685, 110007867040, AA11546431
  • A Network Visualization System Focusing on Important Nodes
    NAKAMURA MIYAMUYA Hiroko; OHZAHATA Satoshi; NAKAO Akihiro; KAWASHIMA Konosuke; SUZUKI Yoshio
    We propose a visualization system for file-sharing network data. The file-sharing networks have some problems, for example: the contents distribution of the copyright infringement files, an increase in the amount of traffic, and so on. To overcome these problems, techniques for observing the network state and controlling the file sharing are proposed. In addition, the proposed techniques realize effective control by giving retrieval control to the key nodes, which are important roles in the file-sharing network., The Institute of Electronics, Information and Communication Engineers, 25 Feb. 2010, IEICE technical report, 109, 448, 357-362, Japanese, 0913-5685, 110007867055, AA11546431
  • A Method of Controlling Search Network in Winny Network
    NAKAZAWA Hiroaki; YOSHIDA Masahiro; OHZAHATA Satoshi; NAKAO Akihiro; KAWASHIMA Konosuke
    Problems such as copyright infringement, personal information leakage and large portion of traffic have occurred by P2P file sharing applications recently. One of the reasons of these problems is that a pure P2P network is an autonomous distributed system and does not have management and control mechanism, which makes difficult to control the file distribution and the traffic volume. As solution to control the illegal file distributon, we proposed a search control method, however, the previous proposed method has enough room for efficient control. In this paper, we propose an improved file search efficiency controlling method by using uncooperative peers. The basic idea is that the control peers distufb the file search by setting up a lot of search links to important peers in the search network. We evaluated our method in a live Winny network. The results show that the proposed method improves the control efficiency., The Institute of Electronics, Information and Communication Engineers, 07 Jan. 2010, IEICE technical report, 109, 362, 71-76, Japanese, 0913-5685, 110008000294, AN10013072
  • A measurement and analysis of the file transfer traffic characteristics between prefectures and ASes in Winny network
    KOIZUMI Takashi; YOSHIDA Masahiro; OHZAHATA Satoshi; KAWASHIMA Konosuke
    In recent years, peer-to-peer file-sharing applications have occupied a significant portion of Internet traffic, and given enormous impact to backbones. In particular, traffic characteristics between prefectures and ASes of the P2P traffic have become more important problem. Consequently, we have to understand actual status of the traffic interchange characteristics to construct and manage the future networks. In this paper, we measured and analyzed the file transfer characteristics such as traffic matrices between prefectures and ASes by identifying the file transfer between peers with tracing the file key information in Winny network. The results reveal that Winny increases traffic between prefectures and ASes because file transfer in Winny network do not have locality., The Institute of Electronics, Information and Communication Engineers, 07 Jan. 2010, IEICE technical report, 109, 362, 77-82, Japanese, 0913-5685, 110008000295, AN10013072
  • A Traffic Control Method using Uncooperative High-Degree Peers for Winny Network
    UENO Masahiro; OHZAHATA Satoshi; KAWASHIMA Konosuke
    From the early 2000s, traffic of P2P file sharing applications have been increasing dramatically, and become heavily traffic load for IP networks. Winny, one of the most popular P2P file sharing applications in Japan, has approximately 100,000 peers at anytime, then the traffic makes a large impact on Japanese ISPs. In this paper, we propose a file sharing efficiency control method using control peers for Winny. Our control peers are uncooperative for searching files by discarding queries and metadata with the high degrees. We evaluated effects of our method in several situations by computer simulation. From the results, we confirm decrease of the file search efficiency and transfer traffic., The Institute of Electronics, Information and Communication Engineers, 08 Oct. 2009, IEICE technical report, 109, 228, 115-120, Japanese, 0913-5685, 110007482244, AA11546431
  • A Large Scale Network Visualization for Important Nodes Discovery
    NAKAMURA MIYAMURA Hiroko; OHZAHATA Satoshi; NAKAO Akihiro; KAWASHIMA Konosuke; SUZUKI Yoshio
    We propose a network visualization method for a large-scale file-sharing network dataset. The network dataset has nodes and links that represent the connection between two nodes. When the number of links is large, it is difficult to recognize the structure of the network data, because many links are crossed. In this context, for recognizing the structure and exploring the key nodes, we propose a link-less network visualization method using matrix based representation. In addition, we demonstrate the effectiveness of the proposed method by applying it to the file-sharing network log data., The Institute of Electronics, Information and Communication Engineers, 03 Sep. 2009, IEICE technical report, 109, 188, 85-90, Japanese, 0913-5685, 110007386602, AA11546431
  • A Proposal and Evaluation of Content Poisoning Method for The Share Network
    YOSHIDA Masahiro; OHZAHATA Satoshi; NAKAO Akihiro; KAWASHIMA Konosuke
    In recent years, P2P file sharing networks have been widely used all over the world, and a lot of files are transferred among the users without using web servers. Especially, the Share network, one of the most popular P2P file sharing networks in Japan, has very strong anonymity. Then the live Share network is composed of over 100,000 active peers. However, the Share network does not have management mechanisms for the file distribution. Consequently, the copyright infringements and malware propagation in the Share network has become prevalent. In this paper, we propose a content poisoning method for file distribution control. Then, we apply the content poisoning method to the live Share network. The evaluation results show that the proposed content poisoning is effective in the Share network, however, it could also give a bad influence on the network., The Institute of Electronics, Information and Communication Engineers, 03 Sep. 2009, IEICE technical report, 109, 188, 91-96, Japanese, 0913-5685, 110007386603, AA11546431
  • BS-10-22 Fair Bandwidth Assignment to Each Terminal in Wireless LAN Access Point
    Yoshioka Toshihiro; Ohzahata satoshi; Kawashima Konosuke
    The Institute of Electronics, Information and Communication Engineers, 01 Sep. 2009, Proceedings of the Society Conference of IEICE, 2009, 2, "S-107"-"S-108", English, 110007870417, AN10489017
  • A Communication Quality Control Method for Video Communication by Channel Occupancy Information from IEEE 802.11 MAC Layer
    NAKASHIMA Hiroshi; OHZAHATA Satoshi; KAWASHIMA Konosuke
    Wireless LAN has been widely used recently. Consequently, real-time applications have been increasingly used in wireless environments. IEEE802.11e is prepared as the standard of wireless LAN to improve Quality of Service (QoS) for the real-time applications, however, it cannot offer required QoS for such applications when an application generates excessive traffic. This is because controls of IEEE802.11e only schedule traffic in MAC layer for the generated traffic in upper layer. To solve this problem, we propose an autonomous method to control traffic generation in application layer with using wireless channel occupancy information in MAC layer., The Institute of Electronics, Information and Communication Engineers, 09 Apr. 2009, IEICE technical report, 109, 3, 55-58, Japanese, 0913-5685, 110007225829, AA11546431
  • A Proposal of File Search Control Method and its Evaluation in a Pure P2P Network
    NAKAZAWA Hiroaki; YOSHIDA Masahiro; OHZAHATA Satoshi; KAWASHIMA Konosuke
    The problem such as copyright infringement, personal information leakage and increment of traffic have occurred by P2P file sharing application recently. In this paper, we propose a file search efficiency decrement by using uncooperative peers for the file search. The basic idea is that the control peers disturb the file search by setting up a lot of search links to the upstream peers. We evaluated our method by participation of the control peers in a live Wiiny network. As the results, we confirm decrement of the file search efficiency., The Institute of Electronics, Information and Communication Engineers, 09 Apr. 2009, IEICE technical report, 109, 3, 31-36, Japanese, 0913-5685, 110007225840, AA11546431
  • Winny Network Topology Measurement using File Search Queries
    PUTRA Pratama; YOSHIDA Masahiro; OHZAHATA Satoshi; NAKAO Akihiro; KAWASHIMA Konosuke
    Network topology information in P2P network is useful for increasing network performances, and facilitate the generation of accurate model of topologies for simulation experiments. Unfortunately, the dynamic peer's joining and leaving behavior makes difficult to obtain the accurate network topology information. In this paper, we propose a method of measuring Winny network topolgy by using search queries, and we also evaluate the completeness of the snapshots from the measurement. The results show that completeness of measured link is lower compare to the completeness of measured node., The Institute of Electronics, Information and Communication Engineers, 09 Apr. 2009, IEICE technical report, 109, 3, 25-30, Japanese, 0913-5685, 110007225843, AA11546431
  • BS-4-17 A Measurement Method for Capturing Winny Network Topology(BS-4. System, control and design technologies for emerging network)
    Putra Pratama; Yoshida Masahiro; Ohzahata Satoshi; Nakao Akihiro; Kawashima Konosuke
    The Institute of Electronics, Information and Communication Engineers, 04 Mar. 2009, Proceedings of the IEICE General Conference, 2009, 2, "S-33"-"S-34", English, 110007099429, AN10471452
  • A TCP Flow Control Method using Advertised Window based on MAC Layer Information in IEEE 802.11
    MIKOSHIBA Kengo; NAKASHIMA Hiroshi; OHZAHATA Satoshi; KAWASHIMA Konosuke
    We propose a TCP window flow control method with channel occupancy information in IEEE 802.11 MAC layer to improve communication quality. In congestion control of TCP, the window size is increased until congestion occurs. But this control affects the communication quality of the other communications via the same access point. To resolve this problem, we propose an advertised window controlling method with channel occupancy information in the receiver. The channel occupancy is calculated by analyzing the network allocation vector in the MAC frame of the other terminals. Then, the congestion window size of the sender is adjusted not to affect communications for the other communications. Experimental evaluations show that our method works well under TCP communication from QoS viewpoint., The Institute of Electronics, Information and Communication Engineers, 24 Feb. 2009, IEICE technical report, 108, 458, 37-42, Japanese, 0913-5685, 110007324754, AN10013072
  • A QoS Adjustment by using TCP Window Flow Control with MAC Layer Information in IEEE 802.11
    MIKOSHIBA Kengo; NAKASHIMA Hiroshi; OHZAHATA Satoshi; KAWASHIMA Konosuke
    We propose a method for improving communication quality by TCP window flow control with channel occupancy information in IEEE 802.11 MAC layer. In the congestion control of TCP, the window size is increased for the communication until congestion occurs. But this control affects the communication quality of the other terminals connected to the same access point. To resolve this problem, we propose to modify the congestion window size dynamitically with channel occupancy. The channel occupancy is calculated by analyzing the network allocation vector in the MAC frame from the other terminals. Then, the congestion window size is adjusted not to affect communications in the other terminals. Experimental evaluation shows that our method conducts TCP communication without affecting communication in the other terminals., The Institute of Electronics, Information and Communication Engineers, 04 Dec. 2008, IEICE technical report, 108, 342, 7-12, Japanese, 0913-5685, 110007114135, AN10013072
  • A Proposal of Index Poisoning Method for Winny Network and Evaluation
    YOSHIDA Masahiro; OHZAHATA Satoshi; NAKAO Akihiro; KAWASHIMA Konosuke
    P2P file sharing applications have been widely used by millions of users all over the world. However, these applications do not usually have management mechanisms for distributing files in general. Consequently, copyright infringements in P2P file sharing networks have become prevalent. In order to prevent illegal file distribution, an index poisoning has attracted much attention recently. Although the index poisoning aims to obfuscate uses by diffusing a lot of dummy metadata in P2P networks, its effects have not been well studied yet. In this paper, we propose an index poisoning method for Winny network, one of the most popular P2P file sharing networks in Japan, and evaluate the effectiveness of our control over file distribution. The evaluation result show that index poisoning is effective in Winny network but it could also give a bad influence on the network., The Institute of Electronics, Information and Communication Engineers, 11 Sep. 2008, IEICE technical report, 108, 203, 93-98, English, 0913-5685, 110007004744, AA11546431
  • M-024 An Enhanced TCP Window Flow Control with MAC Layer Information in Wireless LAN
    Mikoshiba Kengo; Nakashima Hiroshi; Ohzahata Satoshi; Kawashima Konosuke
    Forum on Information Technology, 20 Aug. 2008, 情報科学技術フォーラム講演論文集, 7, 4, 217-218, Japanese, 110007641671, AA1242354X
  • A proposal of poisoning method for file ID search in a P2P file sharing network
    YOSHIDA Masahiro; OHZAHATA Satoshi; KAWASHIMA Konosuke
    Some P2P file sharing networks do not control distribution files in their protocol. In these cases, the poisoning method is effective. The poisoning method complicates file download by diffusing controlled metadata or files in the network. When keywords are used for the file search, simple poisoning technique is effective. But Winny or Share, very popular P2P file sharing networks in Japan, resist poisoning by file ID search. In this report, we implement poisoning system for Winny network to improve the problem, and the results of evaluation experiment show effectiveness of poisoning methods of proposed file ID search., The Institute of Electronics, Information and Communication Engineers, 15 May 2008, IEICE technical report, 108, 31, 49-54, Japanese, 0913-5685, 110006861885, AA11546431
  • An evaluation of a file distibution control method by the poisoning technology for the unstructured P2P file sharing network
    YOSHIDA MASAHIRO; OHZAHATA SATOSHI; KAWASHIMA KONOSUKE
    Some unstructured P2P file sharing applications do not have a file eliminate in their protocol. It is difficult to control a file distribution in such networks. In those case, the poisoning is effective. In this report, we implement poisoning system for Wirmy network, and the resulets of evaluation experiment show effectiveness of poisoning methods., Information Processing Society of Japan (IPSJ), 19 Mar. 2008, 情報処理学会研究報告システム評価(EVA), 2008, 30, 31-36, Japanese, 0919-6072, 110006820510, AA11583959
  • An adaptive routing method using channel load information for wireless ad-hoc network
    YOSHIOKA Toshihiro; OHZAHATA Satoshi; KAWASHIMA Konosuke
    13 Mar. 2008, 全国大会講演論文集, 70, 219-220, Japanese, 110006866714, AN00349328
  • A wireless LAN bandwidth control by using MAC layer state information
    NAKASHIMA Hiroshi; MIKOSHIBA Kengo; OHZAHATA Satoshi; KAWASHIMA Konosuke
    13 Mar. 2008, 全国大会講演論文集, 70, 257-258, Japanese, 110006866732, AN00349328
  • A File-Sharing Suppression Method for Pure P2P File-Sharing Network by Using COntrol Peers
    YAMAZAKI Takayuki; OHZAHATA Satoshi; KAWASHIMA Konosuke
    13 Mar. 2008, 全国大会講演論文集, 70, 429-430, Japanese, 110006866818, AN00349328
  • A Study on file distribution control method by poisoning for a P2P file sharing network
    YOSHIDA Masahiro; OHZAHATA Satoshi; KAWASHIMA Konosuke
    13 Mar. 2008, 全国大会講演論文集, 70, 169-170, Japanese, 110006866689, AN00349328
  • A Network Configuration Method for Pure P2P Streaming Media Distribution using Statistical Characteristic of Peer Lifetime
    KURAKAKE Morihisa; OHZAHATA Satoshi; KAWASHIMA Konosuke
    13 Mar. 2008, 全国大会講演論文集, 70, 571-572, Japanese, 110006864615, AN00349328
  • A File Sharing Control Method for Pure P2P File Sharing Network by using Control Peers
    YAMAZAKI Takayuki; OHZAHATA Satoshi; KAWASHIMA Konosuke
    We proposed a file sharing control method for a pure P2P network, Winny. In our method, control peers join the overlay network and establish file search links to the file uploading peers. Since the all search links are controlled by the control peers, the meta file for file advertisement is not diffused over the file search network. Then, the other peers in the Winny network cannot find the desired file via file search network because the query hit is never returned. We develop a prototype system and give basic evaluations of our proposed method., The Institute of Electronics, Information and Communication Engineers, 13 Sep. 2007, IEICE technical report, 107, 222, 79-82, Japanese, 0913-5685, 110006420524, AN10013072
  • BS-8-4 A Proposal of Pure P2P Network Topology Estimation Method by Active Measurement
    Ohzahata Satoshi; Kawashima Konosuke
    The Institute of Electronics, Information and Communication Engineers, 29 Aug. 2007, Proceedings of the Society Conference of IEICE, 2007, 2, "S-84"-"S-85", Japanese, 110006632455, AN10489017
  • A Pure P2P Application Traffic Identification Method and Evaluations of Traffic Characteristics
    OHZAHATA Satoshi; KAWASHIMA Konosuke
    In P2P networks, it is mainly music and video files that are transferred, and it is known that the traffic volume is much larger than that of classical Client/Server applications. However, the nature of current P2P application traffic is not well known because of the anonymous communication architectures used. To solve this problem, we have developed an identification method for pure P2P application traffic, especially for Winny, the most popular pure P2P file sharing application in Japan. Our proposed method relies only on Client/Server relationships among the peers, without recourse to application header information. In addition to describing the method, we also give an evaluation of the characteristics of the identified traffic collected in an ISP., Information Processing Society of Japan (IPSJ), 22 Jun. 2007, 情報処理学会研究報告システム評価(EVA), 2007, 63, 7-14, English, 0919-6072, 110006345299, AA11583959
  • An Identification and Evaluation for a Pure P2P Application Traffic
    OHZAHATA Satoshi; KAWASHIMA Konosuke
    Pure Peer-to-peer (P2P) networks are widely used nowadays as a file sharing system because of their acalability and flexibility. However, the current the P2P application traffic is not well known because of their anonymous communication architectures. To solve this problem, we have developed and identification method for pure P2P application traffic, especially for Winny. Our proposed method only relies on Client/Server relationships among the peers without application header information. We give some evaluation results for our proposed identification method and characteristic of the identified traffic measured in ISP., The Institute of Electronics, Information and Communication Engineers, 12 Apr. 2007, IEICE technical report, 107, 6, 43-48, English, 0913-5685, 110006273332, AA11546431
  • BS-8-8 A Traffic Identification Method with Client/Server Relationships
    OHZAHATA Satoshi; KAWASHIMA Konosuke
    The Institute of Electronics, Information and Communication Engineers, 07 Mar. 2007, Proceedings of the IEICE General Conference, 2007, 2, "S-77"-"S-78", Japanese, 110006464445, AN10471452
  • A Control Method for Improving Communication Quality of Robot Wireless Ad Hoc Network
    WANG Biao; OHZAHATA Satoshi; KAWASHIMA Kounosuke
    Wireless ad hoc network constructed by robots will be useful to obtain information on the spots where people cannot access by some reasons. However, if we adopt wireless LAN for communication media, so-called "exposed terminal problem" and moreover obstacles on the wireless communication environment may cause the throughput decrease inevitably. This paper proposes a method to obtain good throughput between the spot to be monitored and the center. Robots are estimating the available bandwidth of wireless link by using information contained in the packets and move to appropriate location to realize a good communication route. We make an experimental network and evaluate the proposed method., Information Processing Society of Japan (IPSJ), 14 Nov. 2005, IPSJ SIG Notes, 2005, 111, 13-18, Japanese, 0919-6072, 110002973435, AN10116224
  • Available Bandwidth Estimation Method during TCP Communication Employing IPID
    OHZAHATA Satoshi; KAWASHIMA Konosuke
    Investigating network status is impotant issue to evaluate communication quality and network design, and traffic has been measured for the evaluation. A passive measurement method for available bandwidth estimation over the comunication route is difficult by the cost, and an active measurement has been proposed by many studies. However, an active measurement has tradeoff between the number of probe packets and accuracy, because the probe traffic affects the other traffic. To solve the problem, we foucus on the fact that IPID value is sequentially assigned by the sender and deal the sequential packet as the packet train. By passive measurement of TCP communication, we can estimate available bandwidthe over the communicaiton route as if real active measurement., The Institute of Electronics, Information and Communication Engineers, 15 Sep. 2005, IEICE technical report, 105, 278, 95-98, Japanese, 0913-5685, 110003224405, AA11546431
  • L-017 Evaluations of TCP Communication by Throughput Measurements
    Suzuki Hideaki; Ohzahata Satoshi; Kawashima Konosuke
    Forum on Information Technology, 22 Aug. 2005, 情報科学技術フォーラム一般講演論文集, 4, 4, 39-40, Japanese, 110007684479, AA11740605
  • F-015 A Control Method for Robot Ad Hoc Network by using Communication Quality Information
    Wang Biao; Ohzahata Satoshi; Kawashima Kounosuke
    Forum on Information Technology, 22 Aug. 2005, 情報科学技術フォーラム一般講演論文集, 4, 2, 223-224, Japanese, 110007687847, AA11740605
  • A Study on Pure P2P Network Size Estimation Method
    HACHISUKA Daiki; OHZAHATA Satoshi; KAWASHIMA Konosuke
    P2P applications rapidly increase their users with spreading of high performance personal computer connecting to broadband Internet. P2P applications have different architecture from the classical server-client based computing application. Winny is one of the most popular pure P2P file exchange application in Japan. In the Pure P2P architecture, there is no network administrator. This feature make difficult to administrate the users and no one knows the number of the users. This paper presents a size estimation method for Winny network with combination of measurement analysis and computer simulation experiments., The Institute of Electronics, Information and Communication Engineers, 14 Apr. 2005, IEICE technical report, 105, 12, 1-4, Japanese, 0913-5685, 110003203939, AA11546431
  • B-7-81 A Proposal of a Guidance Architecture for Hot-spot Users by Employing an Ad-hoc Network
    OHZAHATA Satoshi; KAWASHIMA Konosuke; KOBAYASHI Takehiko
    The Institute of Electronics, Information and Communication Engineers, 07 Mar. 2005, Proceedings of the IEICE General Conference, 2005, 2, 235-235, Japanese, 110004694389, AN10471452
  • A Recent Topic of Traffic Study on Wireless Local Area Networks
    KAWASHIMA Konosuke; OHZAHATA Satoshi
    Recently portable computers have been smaller, much more powerful and widely used. We can access to the Internet over cellular or hot-spot network by using these devices. Ubiquitous networking environments are preparing to realize advanced information society where anyone communicates with anyone, in anytime and in anywhere. In the near future, each device has many wireless interfaces and dynamically constructs cellular and ad-hoc networks. By integrating these networks, we will be able to flexibly access to the Internet. The wireless LAN will play a large role in the next generation wireless networks. We focus on the wireless network which is configured by the wireless LAN. First, we show our proposed queue management method for improving TCP performance over a wireless link, and the evaluations. Second, evaluations of the queue management over multi-hop wireless LAN networks are depicted. Next, we show traffic characteristics in the mobile backbone network with the wireless LAN, which is configured by the mobile ad-hoc network. Finally, we discuss the future orientation of the wireless LAN., The Institute of Electronics, Information and Communication Engineers, 10 Jun. 2004, IEICE technical report. Information networks, 104, 120, 43-48, Japanese, 0913-5685, 110003177603, AN10013072
  • B-6-195 A Stable Network Configuration Method for Pure P2P Streaming Media Distribution
    FUJISAKI Takaaki; OHZAHATA Satoshi; KAWASHIMA Konosuke
    The Institute of Electronics, Information and Communication Engineers, 08 Mar. 2004, Proceedings of the IEICE General Conference, 2004, 2, 195-195, Japanese, 110003265159, AN10471452
  • Evaluations of Communication Quality for Mobile Ad-Hoc Networks Constructed by Pedestrians
    OHZAHATA Satoshi; KAWASHIMA Konosuke; KOBAYASHI Takehiko
    We measure trace data of pedestrian mobility. With using the trace data, we simulate pedestrian mobility between them and evaluate communication quality for Ad-hoc routing protocols over the topology., The Institute of Electronics, Information and Communication Engineers, 27 Feb. 2004, Technical report of IEICE. RCS, 103, 682, 65-69, Japanese, 0913-5685, 110003304431, AN10060822
  • A Network Reconfiguration Method for Pure P2P Streaming Media Distribution in Case of Peer Drop-out
    FUJISAKI Takaaki; KAWASHIMA Konosuke; OHZAHATA Satoshi
    We propose a network reconfiguration method in case of peer drop-out for Pure P2P streaming media distribution. In our method, each peer is correctly notified of addresses information of active peers in the network, and is classified into permanent or temporary one. We quantitatively show that these controls can reduce the network deviation and serve firmer network after the reconfiguration than the one of the before., The Institute of Electronics, Information and Communication Engineers, 12 Dec. 2003, 電子情報通信学会技術研究報告. PN, フォトニックネットワーク, 103, 508, 29-32, Japanese, 0913-5685, 110003223593, AA11864040
  • Some Traffic Characteristics of Peer-to-Peer (P2P) Network
    KAWASHIMA Konosuke; OHZAHATA Satoshi
    Peer-to-peer (P2P) file-sharing software appeared for the last two or three years. A software named as Napster had been explosively used from the beginning of the appearance and caused the copyright problems on music file exchanges. At the same time, progress of digital technologies, density growth of LSI, and capacity expansion of optical fiber have been advancing. By virtue of the advancement of technologies, the speed of access channel has been becoming higher and higher, and always-on connection environments have been available with very cheap price. Such environments enable the broader use of P2P file-sharing. P2P traffic volume in the network is increasing enormously, and the portion of P2P traffic occupies over a half of the total traffic in many of networks. This paper surveys characteristics of P2P traffic based on many recent literatures. We focused on some measurements such as traffic ratio of the each application, file size, signaling traffic volume and throughput behavior. Although P2P technology is extremely excellent technology under sufficient large network resources environments, however we should control P2P traffic to maintain appropriate communication quality for the users. The traffic control technologies have important role in the future and we also slightly discuss them., The Institute of Electronics, Information and Communication Engineers, 04 Dec. 2003, IEICE technical report, 103, 492, 37-42, Japanese, 0913-5685, 110003177384, AN10013072
  • Evaluation of a Queue Management Method for TCP Communications over Multi-hop Lossy Wireless Links
    OHZAHATA Satoshi; KAWASHIMA Konosuke
    In this paper we propose a queue management method for improving TCP performance over multi-hop wireless links. With our proposed control method, packet loss in the wireless link is completely eliminated and all packets are delivered in the correct order. No change is required to TCP itself or to the servers. Our proposed method is implemented between the media access control layer (MAC) and logical link layer in each node, and is designed to help the local retransmission control in the MAC layer. Computer simulation experiments show that our proposed method can communicate in high error wireless link conditions even when conventional methods cannot maintain communication. The fairness problem of TCP communication, between connections with different round trip times, is also improved., The Institute of Electronics, Information and Communication Engineers, 07 Nov. 2003, Technical report of IEICE. Multimedia and virtual environment, 103, 425, 71-76, English, 0913-5685, 110003270376, AN10476092
  • A Proposal of Queue Management Method and Retransmission Mechanism for Wireless TCP Communications
    Satoshi Ohzahata; Shigetomo Kimura; Yoshihiko Ebihara
    This paper proposes a queue management method for improving TCP performance over a wireless link. The proposed method is implemented between the media access control (MAC) layer and the logical link (LL) layer in BS and designed to help the local retransmission control in the MAC layer. No change is required to TCP itself and servers. From the proposed control any packet loss in the wireless link is completely eliminated and all packets are delivered in the order. The proposed method keeps trying to consume the available bandwidth of the wireless link at high bit error rate conditions under the ordinal TCP controls.This paper proposes a queue management method for improving TCP performance over a wireless link. The proposed method is implemented between the media access control (MAC) layer and the logical link (LL) layer in BS, and designed to help the local retransmission control in the MAC layer. No change is required to TCP itself and servers. From the proposed control, any packet loss in the wireless link is completely eliminated and all packets are delivered in the order. The proposed method keeps trying to consume the available bandwidth of the wireless link at high bit error rate conditions under the ordinal TCP controls., 06 Mar. 2003, 情報処理学会研究報告モバイルコンピューティングとユビキタス通信(MBL), 2003, 21, 111-118, Japanese, 170000039256, AA11851388

Books and other publications

  • ゴールドスミス ワイヤレス通信工学
    Andrea Goldsmith; 著; 小林岳彦; 訳; 岩切直彦; 大坐畠智; 幸谷智; 高橋賢; 森香津夫; 山嵜彰一郎
    Japanese, Joint translation, 丸善, 2007
  • A Traffic Identification Method and Evaluations for a Pure P2P Application
    Satoshi Ohzahata; Yoichi Hagiwara; Matsuaki Terada; Konosuke Kawashima
    English, Editor, Springer-Verlag, Mar. 2005
  • A Fast Authentication Method for Secure and Seamless Handoff
    Satoshi Ohzahata; Shigetomo Kimura; Yoshihiko Ebihara
    English, Editor, Springer-Verlag, Sep. 2002

Courses

  • ユビキタスネットワーク
    The University of Electro-Communications
  • ユビキタスネットワーク
    電気通信大学
  • アカデミックリテラシー
    The University of Electro-Communications
  • アカデミックリテラシー
    電気通信大学
  • Graduate Technical English
    The University of Electro-Communications
  • 大学院技術英語
    電気通信大学
  • コンピュータネットワーク特論
    The University of Electro-Communications
  • コンピュータネットワーク
    The University of Electro-Communications
  • 暗号・情報セキュリティ
    The University of Electro-Communications
  • 数値計算およびプログラミング演習
    The University of Electro-Communications
  • コンピュータネットワーク特論
    The University of Electro-Communications
  • コンピュータネットワーク特論
    電気通信大学
  • 暗号・情報セキュリティ
    The University of Electro-Communications
  • 暗号・情報セキュリティ
    電気通信大学
  • コンピュータネットワーク
    The University of Electro-Communications
  • コンピュータネットワーク
    電気通信大学
  • 数値計算およびプログラミング演習
    The University of Electro-Communications
  • 数値計算およびプログラミング演習
    電気通信大学
  • ネットワークアーキテクチャ論2
    The University of Electro-Communications
  • ネットワークアーキテクチャ論2
    The University of Electro-Communications
  • Network Architecture 2
    The University of Electro-Communications
  • ネットワークアーキテクチャ論2
    電気通信大学

Affiliated academic society

  • IEEE
  • ACM
  • IEICE
  • IPSJ

Research Themes

  • ルータキャッシュを用いた優先度制御による超低遅延通信基盤
    大坐畠 智
    Principal investigator, 本研究では、コンピュータネットワークで用いられているルータのStore-and-Forward転送において輻輳時に起きるキュー遅延をなくすアーキ テクチャ、制御を明らかにする。ルータにキャッシュをすることができる情報指向ネットワーク(ICN)を用い、輻輳時には、ルータのインタ ーフェースからパケットをキャッシュに退避することで、常にキューにはパケットがたまらない状況にして遅延が起きないアーキテクチャを明 らかにする。さらに、通信(コンテンツ)に優先度をつけ、キューの待ち時間が全くないコンテンツと、キャッシュにコンテンツ一時退避され るコンテンツの間で優先制御を行う仕組みを明らかにする。
    Apr. 2022 - Mar. 2026
  • 通信品質を考慮したコンテンツセントリックネットワークのアーキテクチャ設計と構築
    Ohzahata Satoshi
    Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research, The University of Electro-Communications, Grant-in-Aid for Scientific Research (C), We propose QoS architecture for video streaming over CCN. First, we propose a congestion-aware adaptive streaming over CCN combined with the explicit congestion notification (CAAS with ECN) to avoid QoE degradation. The simulation experiments show that the bitrate adjustment for all the clients improves QoE degradation and QoE fairness due to effective congestion avoidance. Next, we propose a content registration method for CCN routers with a blockchain technology to get content information in the architecture. We design and implement the content registration in CCN software platform Cefore and evaluated content information registration time., 18K11258
    01 Apr. 2018 - 31 Mar. 2021
  • Access Cloud: Fast and Fair Communication Using Multiple Wireless Networks
    Yamai Nariyoshi
    Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research, Tokyo University of Agriculture and Technology, Grant-in-Aid for Scientific Research (C), In this research, we propose a network access method to realize high-speed and fair communication with multiple users in a multihomed network where each terminal can use multiple access points simultaneously. The proposed method introduces a VPN server on the network side to communicate with multiple terminals with MPTCP so that terminals can perform high-speed access while ensuring reliability and fairness by means of selective bicasting and route selection by VPN server. As a result, based on the communication status of each access point, the VPN server can alternate the communication path between each terminal and the VPN server using use an external program., 17K00118
    01 Apr. 2017 - 31 Mar. 2020
  • ブロックチェーンにおける安全で高速なトランザクション確定方式
    (公財)大川情報通信基金, 研究助成
    01 Apr. 2018 - 31 Mar. 2019
  • Network-Driven Packet Transfer Method on Wireless Ad Hoc Networks
    Yamamoto Ryo; OKAMURA Yasushi; KATO Toshihiko; OHZAHATA Satoshi; YAMAZAKI Taku; TANAKA Yoshiaki; MIYOSHI Takumi
    Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research, The University of Electro-Communications, Grant-in-Aid for Young Scientists (B), This research aims to improve the communication performance of wireless ad hoc networks, which consists of terminals equipped with wireless communication devices without the help of communication infrastructures such as base stations and access points. Wireless ad hoc networks generally take source terminal-driven communication control principle and it may face the difficulties in network state prehension and adaptive communication control. This research studied a novel network-driven communication control which does not require controls on source terminals to address the former issues. The performance evaluation confirms that the proposed method could achieve higher communication performance, such as reliability and efficiency., 15K15978
    01 Apr. 2015 - 31 Mar. 2018
  • 並列分散エミュレーション環境における通信ノード間のイベント同期改善方式
    Ohzahata Satoshi
    Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research, The University of Electro-Communications, Grant-in-Aid for Scientific Research (C), Principal investigator, When parallel and distribution processing is used for wireless network emulation, the results are different in case that each of the receiver nodes independently run the events without synchronizing among these events. In the previous method, the frame has a seed of the random number to be used for an event execution at the receiver terminals within one hop because a frame is broadcasted in its transmission range. In addition, the information needed for the event execution is also previously shared among the receivers in order to get the same result with being generated by the random values. However, the effectiveness of our previous work is limited within one-hop wireless communication. In this study, we extend our previous method to multi-hop wireless network environment with considering a hidden terminal and sharing parameters needed for the synchronized event execution., 15K00117
    01 Apr. 2015 - 31 Mar. 2018
  • 無線LAN環境における効率の良いオンデマンドストリーミング配信に関する研究
    (公財)電気通信普及財団, 研究助成
    01 Apr. 2016 - 31 Mar. 2017
  • コンテンツ指向ネットワークに対するドメインの概念の導入に関する研究
    日揮・実吉奨学会研究助成金
    01 Sep. 2014 - 31 Aug. 2015
  • 無線LAN環境におけるオーバヒアリングを用いた高速ダウンロード方式
    OHZAHATA Satoshi
    Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research, The University of Electro-Communications, Grant-in-Aid for Young Scientists (B), In wireless LAN, since the bandwidth is shared with the terminals, the download speed is reduced even if the same content is downloaded. We have proposed a download acceleration method for content distribution by overhearing packets of the same content for other nodes in wireless LAN. Since parts of the content are obtained by the overhearing, the download time is reduced. In the method, the content is divided into pieces and the server distributes them. First, we show scheduling methods of pieces to send and destination with applying network coding, and evaluated these methods in testbed. Next, we evaluate scalability of the proposed method but we found that a distributed emulator has problems for modeling accuracy. We improve modeling of the emulator and evaluate scalability of the proposed method., 23700071
    2011 - 2013
  • 大規模分散環境を用いたP2Pネットワーク流通ファイル制御システムの研究
    NAKAO Akihiro; KAWASHIMA Konosuke; OHZAHATA Satoshi; MIYAMURA Hiroko
    Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research, The University of Tokyo, Grant-in-Aid for Scientific Research (B), The objective of this research is to develop the control methods for P2P file distribution and P2P traffic through poisoning where fake files and meta-information of the files are injected into the targeted P2P network and to examine the effectiveness of our proposed methods in the real internet network environment. For example, we conduct research on (1) the control method for distributed poisoning to restrict the dissemination of targeted files, (2) the localization of the P2P traffic and (3) the visualization of the effectiveness of our control against large-scale P2P file distribution networks., 21300020
    2009 - 2012
  • P2Pファイル共有ネットワークの測定と制御に関する研究
    KAWASHIMA Konosuke; OHZAHATA Satoshi; NAKAO Akihiro
    Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research, Tokyo University of Agriculture and Technology, Grant-in-Aid for Scientific Research (B), We measured Winny network to model behavior of peers with/without a file, and modeled join/leave process of peers. To control file distribution in Winny network, we developed two file control methods and confirmed the effectiveness. The one is controlling the search network to control file search query. Another one is the index poisoning for the file search., 20300025
    2008 - 2010
  • 無線インターネットにおけるMAC層から得られる情報を用いたクロスレイヤ制御方式
    OHZAHATA Satoshi
    Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research, Tokyo University of Agriculture and Technology, Grant-in-Aid for Young Scientists (B), A Channel occupancy is estimated from information of MAC layer. The information is used for the higher layer control via a cross layer control. The higher layer adjusts the traffic generation for the channel occupancy. The proposed methods are evaluated by computer simulation experiments and testbed., 20700057
    2008 - 2009
  • P2Pファイル共有トラヒックの特定法と測定・分析
    KAWASHIMA Konosuke; OHZAHATA Satoshi
    Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research, Tokyo University of Agriculture and Technology, Grant-in-Aid for Scientific Research (C), (1) P2P Traffic Identification Method Peer-to-Peer (P2P) file sharing applications are widely used nowadays. In overlay networks, it is mainly music and video files that are transferred, and it is known that the traffic volume is much larger than that of classical Client/Server applications. However, the nature of current P2P application traffic is not well known because of the anonymous communication architectures used. To solve this problem, we have developed an identification method for pure P2P application traffic, especially for Winny, the most popular pure P2P file sharing application in Japan. Our method relies only on Client/Server relationships among the peers, without recourse to application header information. Our experiment shows that our identification of FN is 0.053-0.116 and FP is lower than 1/10000. (2) Characteristics Evaluation of P2P Traffic We applied our method to ISP traffic and gave an evaluation of the identified Winny traffic. The characteristics of the Winny flows are almost symmetric for the outgoing flows to the Internet and the incoming flows. A small number of peers are responsible for producing almost all the traffic volume. Small correlation is observed between uploading traffic and downloading traffic in one peer. This is because that there is not explicit incentive mechanism in Winny network., 18500047
    2006 - 2007