Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Korean Institute of Communications and Information Sciences
Journal Basic Information
Journal DOI :
The Korean Institute of Communications and Information Sciences
Editor in Chief :
Volume & Issues
Volume 30, Issue 12C - Dec 2005
Volume 30, Issue 12B - Dec 2005
Volume 30, Issue 12A - Dec 2005
Volume 30, Issue 11C - Nov 2005
Volume 30, Issue 11B - Nov 2005
Volume 30, Issue 11A - Nov 2005
Volume 30, Issue 10C - Oct 2005
Volume 30, Issue 10B - Oct 2005
Volume 30, Issue 10A - Oct 2005
Volume 30, Issue 9C - Sep 2005
Volume 30, Issue 9B - Sep 2005
Volume 30, Issue 9A - Sep 2005
Volume 30, Issue 8C - Aug 2005
Volume 30, Issue 8B - Aug 2005
Volume 30, Issue 8A - Aug 2005
Volume 30, Issue 7C - Jul 2005
Volume 30, Issue 7B - Jul 2005
Volume 30, Issue 7A - Jul 2005
Volume 30, Issue 6C - Jun 2005
Volume 30, Issue 6B - Jun 2005
Volume 30, Issue 6A - Jun 2005
Volume 30, Issue 5C - May 2005
Volume 30, Issue 5B - May 2005
Volume 30, Issue 5A - May 2005
Volume 30, Issue 4C - Apr 2005
Volume 30, Issue 4B - Apr 2005
Volume 30, Issue 4A - Apr 2005
Volume 30, Issue 3C - Mar 2005
Volume 30, Issue 3B - Mar 2005
Volume 30, Issue 3A - Mar 2005
Volume 30, Issue 2C - Feb 2005
Volume 30, Issue 2B - Feb 2005
Volume 30, Issue 2A - Feb 2005
Volume 30, Issue 1C - Jan 2005
Volume 30, Issue 1B - Jan 2005
Volume 30, Issue 1A - Jan 2005
Selecting the target year
A Study on Security Analysis and Security Design for IPv6 Transition Mechanisms
Choi, In-Seok ; Kim, Young-Han ; Jung, Sou-Hwan ;
The Journal of Korean Institute of Communications and Information Sciences, volume 30, issue 11B, 2005, Pages 689~697
The IETF has created the v6ops Working Group to assist IPv6 transition and propose technical solutions to achieve it. But it's quite problem which security consideration for a stage of IPv4/IPv6 transition and co-existence. There are new security problem threat that it caused by the characteristics of heterogeneity. In this paper, we describe IPv6 transition mechanisms and analyze security problem for IPv6 transition mechanism. also we propose security consideration and new security mechanism. We analyzed DoS and DRDoS in 6to4 environment and presented a address sanity check as a solution. We also showed an attack of address exhaustion in address allocation server. To solve this problem, we proposed challenge-response mechanism in DSTM.
A Policy on WLAN MAC Parameters Usage for QoS Provisioning
Jeong, Dae-In ; Hong, Chang-Hyun ;
The Journal of Korean Institute of Communications and Information Sciences, volume 30, issue 11B, 2005, Pages 698~706
In this paper, we investigate the parameters of the IEEE 802.11e MAC protocol, CWmin and AIFS, in terms of their capability of QoS control. The delay and the bandwidth performances are selected as the QoS medics to examine the characteristics of those parameters. A policy on MAC parameters usage, thereby, is proposed. We regard the MAC-level traffic classification as the differentiation in the channel accessibility, and thus the delay differentiation is referred to a main issue of the class-level QoS control. Realizing the tight relationship between the delay performance and the parameter AIFS, we derive an analytical expression of their relationship through an analysis of the MAC mechanism. Various simulations are examined which show the validity of our assertions, and a policy on the parameters usage is proposed based on those observations.
Centralized Scheme for the Provisioning Control in the Synchronous Optical Transport Network
Kang Dongwoo ; Kim Dalwon ; Cho Kyuseob ; Yae Byungho ;
The Journal of Korean Institute of Communications and Information Sciences, volume 30, issue 11B, 2005, Pages 707~721
Recently, there has been a dramatic increase in data traffic, driven primarily by the explosive growth of the Internet. Optical networking is believed as a key solution to keep up with the growth, thus, the most pressing issue is how to manage and control large optical networks. Currently, provisioning end-to-end connections across the transport network has involved the network operator, leading to long provisioning times in an era when customers are demanding shorter provisioning time. To address this critical issue, new control intelligence is being studied for use within optical networks to shorten provisioning time. Both the IETF and the ITU-T have been aggressively defining many aspects of a control plane for the next generation convergence transport network. Basically, they are based on the distributed control scheme. In this Paper, we suey the applicability of the centralized control scheme for the provisioning control of optical transport network to utilize its inherent advantages over the distributed control scheme. We discuss new central control architecture, and control procedure. Also, we examine the applicability of the existing IETF routing and signaling protocols to the new control concepts, and then, we propose the additional routing and signaling information elements.
Logical Link-Based Multicasting Services in Ethernet Passive Optical Networks
Choi Su-il ;
The Journal of Korean Institute of Communications and Information Sciences, volume 30, issue 11B, 2005, Pages 722~729
Ethernet passive optical networks (EPONs) are an emerging access network technology which has a point-to-multipoint topology. EPONs operate point-to-multipoint in the OLT-ONU direction, and point-to-point in the ONU-OLT direction. To support point-to-point emulation and shared LAM emulation, EPONs use multi-point control protocol (MPCP). The MPCP uses logical link identification (LLID) field for frame tagging and filtering between the OLT and ONUs. In this paper, I propose logical-group identification (LGID) for logical link-based multicasting or VLAN services in EPONs. Using LGID with new frame tagging and filtering rules, EPONs support differentiated multimedia broadcasting or multicasting services. Additionally, EPONs can support logical link-based VLAN services that divides ONUs into several subsets.
A Design of the SMBC for Improving Reliability of Blocking Spam Mail
Park Nho-Kyung ; Han Sung-Ho ; Seo Sang-Jin ; Jin Hyun-Joon ;
The Journal of Korean Institute of Communications and Information Sciences, volume 30, issue 11B, 2005, Pages 730~735
While the E-mail is a important way of fast communication in these days. it is real that the E-mail is often misused as a commercial advertisement method and creates many social problems. Even though various filtering techniques for blocking spam mails have been developed, reliability of mail systems is decreased by misreading normal mails as spam mails, i.e. false-positive errors. In this paper, the SMBC(Spam Mail Blocking Center) platform employing spam mail recovery method based on privacy information is proposed and designed. The SMBC is designed in frame layer based on spam blocking system of proxy sewer and can be physically implemented in various topology so that flexible development with layered module is possible. Using privacy information makes the proposed SMBC platform minimize processing load and false-positive error rates so that it can improve mail system reliabilities.
IPsec Support for NAT-PT in IPv6 Transition Mechanisms
Choi Inseok ; Kim Younghan ; Park Yongseok ; Jung Souhwan ;
The Journal of Korean Institute of Communications and Information Sciences, volume 30, issue 11B, 2005, Pages 736~743
NAT-PT is one of the IPv6 transition mechanisms, as defined in RFC2766, allowing IPv6-only devices to communicate with IPv4-only devices and vice versa. In NAT-PT, sender fail to verify TCP/UDP checksum and authentication data due to IP translation in the NAT-PT server The NAT-PT, therefore, has a limit to applying the IPsec that provides the end-to-end security such as confidentiality, authentication, and integrity. This paper proposes a scheme to apply the IPsec using IP HTI in NAT-PT environment.
Performance Improvement Algorithms for Prediction-based QoS Routing
Joo, Mi-Ri ; Kim, Woo-Nyon ; Cho, Kang-Hong ;
The Journal of Korean Institute of Communications and Information Sciences, volume 30, issue 11B, 2005, Pages 744~749
This paper proposes the prediction based QoS routing algorithm, PSS(Prediction Safety-Shortest) algorithm that minimizes network state information overhead and presumes more accurate knowledge of the present state of all the links within the network. We apply time series model to the available bandwidth prediction to overcome inaccurate information of the existing QoS routing algorithms. We have evaluated the performance of the proposed model and the existing algorithms on MCI networks, it thus appears that we have verified the performance of this algorithm.
Measurement and Analysis of P2P Traffic in Campus Networks Under Firewall
Lee, Young-Seok ;
The Journal of Korean Institute of Communications and Information Sciences, volume 30, issue 11B, 2005, Pages 750~757
This paper reports on the study of P2P traffic behaviors in a high-speed campus network under a simple firewall which drops packets with default port numbers for the well-blown P2P applications. Among several ways of detecting P2P traffic, the easiest method is to filter out packets with the default port number of each P2P application. After deploying the port-based firewall against P2P-traffic, it is expected that the amount of P2P traffic will be decreased. However, during the eight-month measurement period, three new commercial P2P applications have been identified and their traffic usages have reached up to
of the total outbound/inbound traffic volumes at the end of the measurement period. In addition, the most famous P2P application, eDonkey, has adapted and has escaped detection through port hopping. The measurement result shows that the amount of eDonkey traffic is around
of the total outbound/inbound traffic volume. From the measurement results, it is observed that the port-based firewall is not effective to limit the usage of P2P applications and that the P2P traffic is steadily growing due to not only the evolution of existing P2P applications such as port hopping but also appearances of new P2P applications.
The Migration of Data Between Heterogeneous RDBs Using Web Service in Intranet
Park, Yoo-Shin ; Jung, Kye-Dong ; Choi, Young-Keun ;
The Journal of Korean Institute of Communications and Information Sciences, volume 30, issue 11B, 2005, Pages 758~771
Information systems in current corporations are managing and storing large data officially happened on individual and various databases. Corporations for migrating the stored data from these individual databases are adopting with technologies of EAI, MDR, DW etc.. However these technologies are not only required to expenses introduction charge and maintenance cost but also have problems of heterogeneous environment required per each vender In this paper, to solve problems of these current existing technologies, we propose to design our data migration system to migrate source data and semantic constraint condition between heterogeneous relation databases based on web service. As corporations use web services, they can reduce introduction expense and maintenance cost because of using current existent web environment. Each system can independently migrate XML based data against any platform, system environment, and Implementation language.
Region-based Tree Multicasting Protocol in Wireless Ad-Hoc Networks
Lim Jung-Eun ; Yoo Sang-Jo ;
The Journal of Korean Institute of Communications and Information Sciences, volume 30, issue 11B, 2005, Pages 772~783
In this paper, we propose an effective multicasting protocol in wireless ad-hoc networks. Conventional wired and wireless network multicast protocols do not perform well in wireless ad hoc networks because they were designed without consideration of ad hoc environments such as node mobility, limited bandwidth, high error probability. To solve this problem, some multicasting protocols for ad hoc network have been proposed in the literature. However, these protocols can not provide high packet delivery ratio, low control packet overhead and low expended bandwidth at the same time. Therefore, in this paper, we propose RTMA that improves multicasting performance in wireless ad hoc networks. RTMA calculates its current region from its position information by using GPS in order to make tree among the multicast group nodes in the same region. The proposed region-based tree method is for high packet delivery ratio, low control packet overhead when many senders send data packets. RTMA makes a reliable tree by using speed information to fill a gap of the weak points of the tree structure. When searching the routing path, RTMA selects the reliable path excluding high speed nodes.
A Scalable VoD Service Scheme Based on Overlay Multicast Approach
Kim Kyung-Hoon ; Son Seung-Chul ; Nam Ji-Seung ;
The Journal of Korean Institute of Communications and Information Sciences, volume 30, issue 11B, 2005, Pages 784~791
To provide VoD Service on the Internet VoD server is required to have a large amount of system resource and network bandwidth. Therefore, overlay Multicast schemes are considered as suitable alternatives but they also have some drawbacks to support on-demand media services. In this paper, we propose an overlay multicast based on-demand media service scheme which could exploit server's system resource and its network bandwidth efficiently. Proposed scheme uses shared buffer of clients involving the relay of traffic and Patching while it gives no restrictions to this scheme compared with unicast. Our simulation results show that proposed scheme can support more user than unicast and improve the network performance at the same time.
Multi-hop Packet Relay MAC Protocol Considering Channel Conditions in UWB-based WPANs
Wang Weidong ; Seo Chang-Keun ; Jeong Soon-Gyu ; Yoo Sang-Jo ;
The Journal of Korean Institute of Communications and Information Sciences, volume 30, issue 11B, 2005, Pages 792~803
Ultra wide band (UWB) technology will be applied in the high rare wireless personal area networks (WPANs) for its high rate, low power, and innate immunity to multipath fading. In this paper, a power aware multi-hop packet relay MAC protocol in UWB based WPANs is proposed and a power aware path status factor (PAPSF), which is derived from SINR and power resource condition of each device, is used to select a suitable relay node. Compared with relaying by piconet coordinator (PNC), which is easily chosen by other ad hoc routing protocol, the new scheme can achieve hi임or throughput, decrease the time required for transmitting high power signal and we can easily distribute the battery power consumption from PNC to other devices in the piconet to prevent the PNC device using up its battery too fast and finally avoid PNC handover too frequently.