Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yoshihiko Ebihara is active.

Publication


Featured researches published by Yoshihiko Ebihara.


advanced information networking and applications | 2004

A proposal of DNS-based adaptive load balancing method for mirror server systems and its implementation

Hiroshi Yokota; Shigetomo Kimura; Yoshihiko Ebihara

In order to protect a server to become overloading due to concentration of accesses, a mirror server system is widely used for distributing the load to multiservers. For such a system, it is very important for users to select an appropriate one among the servers. In the previous systems, the DNS (domain name system) Round-Robin mechanism is widely adopted for this purpose, otherwise users must choose a server by themselves. Even in the former method, however, since all servers are evenly assigned to clients without any cares of the performance and process status of the servers, the load of each server is deflected. To solve the above problem, this article proposes a new adaptive load balancing method based on the ordinary DNS Round-Robin mechanism. In this proposal, a DNS server for the mirror-server system periodically probes the status of each server. For a query from each client, the DNS server changes its response from the probed results and IP address of the client. Finally, the prototype system of the proposal is implemented and the file transfer speeds of both the proposed method and Round-Robin DNS method are estimated for the mirror server system of RingServer Project in Japan.


international conference on computer communications | 2000

Adaptive two-level unequal error protection convolutional code scheme for wireless ATM networks

Zhenqiang Sun; Shigetomo Kimura; Yoshihiko Ebihara

Because the wireless asynchronous transfer mode (ATM) networks are often constrained with the limited link bandwidth and error-prone characteristics, forward error correction (FEC) is needed to improve their bit error rate performance. In this paper, a two-level punctured convolutional code (PCC) scheme is constructed to apply to a wireless ATM cell header and various payloads with the flexible unequal error protection (UEP). Since their perforation matrices can be programmable, the code rates of PCC are applicable to the different sensitivity of source-encoded symbols, even if only the same encoding and decoding hardware is used. Finally, the performance on Gaussian and fading channels is analyzed, which shows significant reductions in cell loss rate (CLR) and good balances for CLR and the payload bit error rate (BER).


ubiquitous computing | 2008

An approach to mobility management in Cellular IP networks utilising power-save mode of IEEE 802.11

Joungwoong Lee; Shigetomo Kimura; Yoshihiko Ebihara

Although FMIPv6, HMIPv6, and F-HMIPv6 have been proposed as enhancements to Mobile IPv6, they still have some technical barriers for fast and seamless handovers. We propose an intelligent mobility protocol benefiting from Cellular IP. To speed up the entire handover procedure, our proposed scheme enables L2 and L3 handovers to be performed in parallel by utilising power-save mode of IEEE 802.11. We provide analytical considerations on the handover latency and packet delivery cost of each protocol. Through our simulation experimental results, we have verified that our proposed scheme shows much better performance over the others under various parameter sets.


advanced information networking and applications | 2003

An introduction of compression algorithms into SSL/TLS and proposal of compression algorithms specialized for application

Nau Okamoto; Shigetomo Kimura; Yoshihiko Ebihara

The specification of SSL/TLS defines that data from the upper layer can be compressed in the record layer before they are encrypted. Since only the no-compression is provided for the compression algorithm in the specification, nobody can compress transmission data at the SSL/TLS protocols unless communication peers have a special agreement to use a compression algorithm. However, the compression mechanism should be useful for the users of narrower bandwidth communication lines such as ordinary analog telephone lines and N-ISDN. In order to solve this problem, the paper first introduces general-purpose compression algorithms into SSL/TLS, and shows that the average transfer times for several Japanese text files via HTTP are much improved, especially for narrow bandwidth communication lines. We also compare it with the compression mechanism on HTTP, and the resulting difference between the results of the SSL/TLS compression and HTTP compression is rather small. For improving the compression ratio, we next propose compression algorithms specialized for application protocols. As examples, we focus to HTTP and HTML, and construct the tree structures of the field names and field values. From the tree, the static dictionaries for the compression algorithms are defined. Finally, we implement the compression algorithms and show the compression ratios when several HTML files are transferred.


Computer Networks and Isdn Systems | 1985

Fault diagnosis and automatic reconfiguration for a ring subsystem

Yoshihiko Ebihara; Katsuo Ikeda; Tomoo Nakamura; Shigeo Nakatsuka; Michihiro Ishizaka

Abstract A ring subsystem has been developed for a full-scale high performance heterogeneous computer network. The design goals and the implementation issues of the automatic reconfiguration of the ring subsystem are presented. Particular emphasis is laid upon reliability improvement techniques, based on duplication of the ring subsystem components, and the automatic reconfiguration algorithm, which determines network configuration when faults occur.


advanced information networking and applications | 2004

Advanced semisoft handoff method of cellular IP access networks

Joungwoong Lee; Shigetomo Kimura; Yoshihiko Ebihara

Mobile IP is the current standard for supporting global mobility, however the performance degrades to support micro mobility. Cellular IP could be a good solution to accommodate efficiently hundreds of, thousands of mobile hosts that perform fast and frequent handoff in a small local area network. In semisoft handoff of cellular IP, a mobile host sends a semisoft packet to the new base station before performing actual handoff to guarantee that the routing cache mapping associated with the new base station is created before actual handoff takes place. But packet loss and handoff delay are still occurred by this model. We propose an advanced semisoft handoff method with no packet loss but with additional small packet delay just before or after handoff. In this method, the cross-over node calculates the time for the last message to be delivered to the mobile host via the old base station just before handoff based on four typical network models. On receiving that packet, the mobile host performs handoff to the new base station. Our simulation experiment results show that the proposed semisoft handoff method actually outperforms the traditional semisoft handoff method in both handoff packet loss and handoff delay. We study the performance of the advanced semisoft handoff method with the network models.


Computer Networks | 1983

GAMMA-NET: A local computer network coupled by a high speed optical fiber ring bus — system concept and structure

Yoshihiko Ebihara; Katsuo Ikeda; Tomoo Nakamura; Michihiro Ishizaka; Makoto Shinzawa; Kazuhiko Nakayama

Abstract The concept and structure of a local computer network are presented for a full scale high performance computer network coupled by a dual 32 Mbps optical fiber ring bus. The design goals of the system are efficient resource sharing and improved RAS. Implementation issues of the system are discussed, focussing on the optical fiber ring bus and the network operating system services. The experimental results also include the processing times for a data link connection/disconnection, the synchronous delay time for a read/write operation matching, and the data transmission speed and efficiency of both the multiplex mode and the burst mode.


international conference on information networking | 2002

A Fast Authentication Method for Secure and Seamless Handoff

Satoshi Ohzahata; Shigetomo Kimura; Yoshihiko Ebihara

In mobile networks such as Mobile IP, a symmetric-key-based authentication method is a typical solution for identifying genuine users of the networks, but restricts scalability of the communications. From this reason, several asymmetric-key-based authentication methods are proposed to release the restriction. However, these methods still suffer from the heavily procedures, especially in the handoff, and public keys can not be distributed efficiently in advance. This paper introduces a key distribution and authentication mechanism for the handoff method with a certificate-based authentication. The computer simulations show that the proposed method provides low key distribution overhead of the authentication with no communications disruption.


Software - Practice and Experience | 1985

Network management in a local computer network

Tomaoo Nakamura; Katsuo Ikeda; Yoshihiko Ebihara; Masafumi Nishikawa

The functions and structure of the network management subsystem of the GAMMA‐NET, a local computer network at the University of Tsukuba, are presented. The network management subsystem is an integrated subsystem that offers a convenient man‐machine interface for the network users during the execution of required jobs, and levels the workload throughout the system, as well as managing the network operations.


IEICE Transactions on Communications | 2007

A Cross-Layer Retransmission Control for Improving TCP Performance in Wireless LAN

Satoshi Ohzahata; Shigetomo Kimura; Yoshihiko Ebihara; Konosuke Kawashima

In this paper we propose a cross-layer retransmission control for TCP communication over a wireless link. With our proposed control, a retransmission delay for lost packet is reduced, packet losses in the wireless link are eliminated and all packets are delivered in the correct order. No change is required to TCP itself or to the sender. Our proposed method is implemented in a queue between the media access control (MAC) layer and logical link layer in a base station, and is designed to assist local retransmission control in the MAC layer. Computer simulations show that our proposed method can maximally use the bandwidth of the wireless link under high bit error rates conditions with conventional TCP control. The fairness problem of TCP communication between connections with different bit error rates in a wireless link is also improved, and MAC level fairness is also controllable.

Collaboration


Dive into the Yoshihiko Ebihara's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Satoshi Ohzahata

University of Electro-Communications

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Manhee Jo

University of Tsukuba

View shared research outputs
Researchain Logo
Decentralizing Knowledge