Noriharu Miyaho
Tokyo Denki University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Noriharu Miyaho.
IEEE Journal of Solid-state Circuits | 1995
Takeo Koinuma; Noriharu Miyaho
The Asynchronous Transfer Mode (ATM) is considered to be a key technology for B-ISDN. This paper discusses VLSI trends and how VLSIs can be applied to realize ATM switching node systems for B-ISDN. Implementing a practical ATM node system will require the development of technologies such as high-throughput ATM switch LSIs with up to 10 Gb/s capacity and SDH termination technology based on optical fiber transmission. An ATM traffic-handling mechanism with Quality of Service (QoS) controls such as ATM layer performance monitoring, virtual channel handling, usage parameter control, and VP shaping requires several hundred thousand logic gates and several megabytes of high-speed static RAM; VLSIs must be introduced if such mechanisms are to be implemented. ATM node system architecture is based on design principles of a building-block-type structure and hierarchical multiplexing. The basic ATM call handling module, the AHM, is composed mainly of a line termination block and a self-routing switch block; we analyzed this module from the viewpoint of the amount of hardware it requires. Finally, future ATM node systems are discussed on the basis of 0.2-/spl mu/m VLSI development trends and hardware requirements such as the need for ultrahigh integration of logic gate with memory, multichip modules, and low power dissipation technology. >
international conference on systems and networks communications | 2010
Yoichiro Ueno; Noriharu Miyaho; Shuichi Suzuki; Kazuo Ichihara
This paper proposes an evaluation result of a high security distribution and rake technology for realizing disaster recovery. In an experimental evaluation, the encryption and spatial scrambling performance and the average response time have been estimated in terms of the file data size. Discussion is also provided on an effective shuffling algorithm to determine the dispersed location sites. Finally, this paper describes a prototype system configuration for several practical network applications, which will be soon commercialized.
use of p2p grid and agents for the development of content networks | 2009
Yoichiro Ueno; Noriharu Miyaho; Shuichi Suzuki
An innovative mechanism of a file-backup system concept is discussed. In the proposed file backup mechanism, the combination of the following technologies such as a spatial random scrambling of file data, a subsequent random fragmentation of the file, the corresponding encryption and duplication for each fragmented one by using a stream cipher in each encryption stage, and the corresponding notification of the history data of the used encryption key code sequence which we call metadata in addition can effectively realize the highly secure and prompt file backup system economically only when they are combined at the same time. In case of disaster occurrences in data backup center, the prompt data recovery can be easily and securely achieved by making use of a widely distributed great amount of PCs or cellular phones via several supervisory servers which are secretly diversified and functionally combined mutually. This paper proposes the above mentioned state-of-the art hybrid disaster recovery mechanism and its basic characteristics.
global communications conference | 1995
Noriharu Miyaho; Arata Itoh; K. Koyama
Asynchronous transfer mode (ATM) technology has been widely studied and will be used to implement the B-ISDN. Although ATM switching nodes are being deployed, much work is still needed to resolve problems with their maintainability. This paper discusses the current research and experience concerning the development of ATM nodes from the viewpoint of maintainability and clarifies the concepts of hardware maintainability by introducing efficient connection test methods using an OAM cell-handling mechanism, an ATM traffic-monitoring mechanism with QoS control, and a test cell generation/checking mechanism for in-service connection testing. To increase maintainability, hardware failure detection/indication methods, a layered management scheme upon detection of a line failure, and automatic line switching to a stand-by system are proposed.
international conference on systems and networks communications | 2010
Noriharu Miyaho; Tatsuro Nakamura; Takamasa Shimada; Noriko Konno
Telemedicine can be implemented using a sensor network that carries users’ biometric information collected by tiny intelligent sensors attached to the human body. We propose a communication system that can be used for telemedicine to improve the Quality of Life of individuals, which uses a sensor network and a sensor database with mutual authentication to ensure security. Finally, this paper describes the priority control mechanism and experiments using it and clarifies the real-time performance of the proposed communication sensor network system.
symposium on vlsi circuits | 1994
Takeo Koinuma; Noriharu Miyaho
The Asynchronous transfer Mode (ATM) is considered to be a key technology for B-ISDN. This paper discusses VLSI trends and how VLSIs can be applied to realize ATM switching node systems for B-ISDN. Implementing a practical ATM node system will require the development of technologies such as high-throughput ATM switch LSIs with up to 10 Gb/s capacity and SDH termination technology based on optical fiber transmission. An ATM traffic-handling mechanism with Quality of Service (QoS) controls such as ATM layer performance monitoring, virtual channel handling, usage parameter control, and VP shaping requires several hundred thousand logic gates and several megabytes of high-speed static RAM; VLSIs must be introduced if such mechanisms are to be implemented. ATM node system architecture is based on design principles of a building-block-type structure and hierarchical multiplexing. The basic ATM call handling module, the AHM, is composed mainly of a line termination block and a self-routing switch block; we analyzed this module from the viewpoint of the amount of hardware it requires. Finally, future ATM node systems are discussed on the basis of 0.2-μm VLSI development trends and hardware requirements such as the need for ultrahigh integration of logic gate with memory, multichip modules, and low power dissipation technology
Iet Communications | 2010
Noriharu Miyaho; Yoichi Iwaki; Tomohiro Yamazaki; Norio Kuji
A state-of-the-art event-driven framework mechanism for handling sensor data by a hybrid processing system is proposed. This mechanism can handle data from different types of sensor networks and can deal with them by using the real-time monitored data. In conventional sensor network monitoring systems, there had been no mechanisms for abstracting the difference between distributed sensor networks that have different communication protocols and corresponding data formats. This study proposes a hybrid sensor processing system that includes both push-type and pull-type mechanisms effectively, utilising push-service history data. The authors have implemented a hybrid sensor network mechanism based on a new event-driven frame architecture and evaluated its basic performance.
asia-pacific conference on communications | 2007
Satoru Kurokawa; Yoichi Iwaki; Noriharu Miyaho
Various information which is owned by a person or by some organizations should be quickly shared by making use of network resources effectively according to user requests. In the conventional data sharing system using the current P2P technology, finding out malicious users, or making unnecessary data distribution to be ineffective arc quite difficult, as well. In this paper, a novel P2P mechanism by making use of mutual authentication, and a series of meta-data base sharing technology is clearly stated to realize both secure communication and traffic load optimization, taking NGN (next generation network) services into account.
asia pacific symposium on information and telecommunication technologies | 2015
Masahiro Furukawa; Kouki Kuroda; Takeshi Ogawa; Noriharu Miyaho
There is an increasing demand for secure communication services that can dynamically reflect user needs. Conventional dedicated services such as an Internet VPN or IPVPN using IPsec and MPLS have inherent shortcomings, making it difficult for them to dynamically reflect user requirements when faced with limited network resources. It is also quite important for communication services to deal effectively with man-in-the-middle (MITM) attacks, a threat that users are certainly aware of. In this paper, we proposed a state-of-the-art SDN service architecture that can reflect user requests easily, dynamically and flexibly. We also proposed a robust network mechanism that can avoid MITM attacks and network eavesdropping by applying a new network address translation method. The most important characteristics of the method are that it can easily increase security strength without terminal host/server side encoding and decoding procedures. As the number of divisions and duplications is adjustable, it is possible to strengthen the security level according to user requests. We implemented an SDN switch to evaluate the performance of the proposed SDN architecture and verified that a secure communication service using the proposed method is realizable. We expect this method to be applied to the construction of future secure SDN services.
2017 International Conference on Digital Arts, Media and Technology (ICDAMT) | 2017
Takeshi Ogawa; Manato Oishi; Noriharu Miyaho
In recent years, video streaming services based on the client server (C/S) model have become common. When distributed through these services, video files need to be watermarked with a unique ID to identify clients, so as to deter illegal video capturing. However, the download bandwidth at servers limit the number of clients that can view video files simultaneously. With peer-to-peer (P2P) communication, the bandwidth problem can be resolved, but new problems arise. The first is the problem of assigning unique IDs to shared video files, the second is interruption problem of video viewing when the uploadside clients change. and the last is privacy problem of viewing history. In this paper, a novel method, Copy Protecting P2P video streaming (CPPP), is proposed. With this method, more than 10 million unique watermarks can be produced without requiring embedding and re-encoding. By using CPPP, copyright management, reliability and anonymity become feasible in P2P communication. Copy protecting P2P video streaming services, which has not yet been achieved, becomes possible.