Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Korean Institute of Communications and Information Sciences
Journal Basic Information
Journal DOI :
The Korean Institute of Communications and Information Sciences
Editor in Chief :
Kwang Soon Kim
Volume & Issues
Volume 33, Issue 12C - Dec 2008
Volume 33, Issue 12B - Dec 2008
Volume 33, Issue 12A - Dec 2008
Volume 33, Issue 11C - Nov 2008
Volume 33, Issue 11B - Nov 2008
Volume 33, Issue 11A - Nov 2008
Volume 33, Issue 10C - Oct 2008
Volume 33, Issue 10B - Oct 2008
Volume 33, Issue 10A - Oct 2008
Volume 33, Issue 9C - Sep 2008
Volume 33, Issue 9B - Sep 2008
Volume 33, Issue 9A - Sep 2008
Volume 33, Issue 8C - Aug 2008
Volume 33, Issue 8B - Aug 2008
Volume 33, Issue 8A - Aug 2008
Volume 33, Issue 7C - Jul 2008
Volume 33, Issue 7B - Jul 2008
Volume 33, Issue 7A - Jul 2008
Volume 33, Issue 6C - Jun 2008
Volume 33, Issue 6B - Jun 2008
Volume 33, Issue 6A - Jun 2008
Volume 33, Issue 5C - May 2008
Volume 33, Issue 5B - May 2008
Volume 33, Issue 5A - May 2008
Volume 33, Issue 4C - Apr 2008
Volume 33, Issue 4B - Apr 2008
Volume 33, Issue 4A - Apr 2008
Volume 33, Issue 3C - Mar 2008
Volume 33, Issue 3B - Mar 2008
Volume 33, Issue 3A - Mar 2008
Volume 33, Issue 2A - Feb 2008
Volume 33, Issue 2C - Feb 2008
Volume 33, Issue 2B - Feb 2008
Volume 33, Issue 1C - Jan 2008
Volume 33, Issue 1B - Jan 2008
Volume 33, Issue 1A - Jan 2008
Selecting the target year
A Study for Implementation of HMIPv6 in all-IP WDM-PON
Lee, Sung-Keun ; Lim, Tae-Hyong ; Seo, Kyung-Rin ; Park, Jin-Woo ;
The Journal of Korean Institute of Communications and Information Sciences, volume 33, issue 5B, 2008, Pages 243~252
In this paper, we propose the next-generation broadband wireless access network architecture, which is based on the wavelength division multiplexing-passive optical network(WDM-PON), and efficient mobility management scheme to support quality-of-service(QoS) of multimedia services in the next-generation wireless network. By adapting WDM-PON technology to wireless access network, the proposed scheme can realize broadband wireless access network. In addition, We utilize newly proposed local channels between optical network units(ONUs) or subnets in order to support the fast and efficient local data and handoff data transmission. We evaluate the performance of the proposed scheme in terms of handoff delay and packet loss thru computer simulation. Thru various computer simulation results, we verified the superior performance of the proposed scheme by comparing with the results of other schemes.
An Energy-Efficient Clustering Mechanism Considering Overlap Avoidance in Wireless Sensor Networks
Choi, Hoon ; Jung, Yeon-Su ; Baek, Yun-Ju ;
The Journal of Korean Institute of Communications and Information Sciences, volume 33, issue 5B, 2008, Pages 253~259
Because a sensor node in wireless sensor networks is battery operated and energy constrained, reducing energy consumption of each node is one of important issues. The clustering technique can make network topology be hierarchical and reduce energy consumption of each sensor node. In this paper, we propose an efficient clustering mechanism considering overlap avoidance in wireless sensor networks. The proposed method consists of three parts. The first is to elect cluster heads considering each node's energy. Then clusters are formed by using signal strength in the second phase. Finally we can reduce the cluster overlap problem derived from two or more clusters. In addition, this paper includes performance evaluation of our algorithm. Simulation results show that network lifetime was extended up to 75 percents than LEACH and overlapped clusters are decreased down to nearly zero percents.
Multiple Path Security-Aware Routing Protocol Mechanism for Ad Hoc Network
Han, In-Sung ; Ryou, Hwang-Bin ;
The Journal of Korean Institute of Communications and Information Sciences, volume 33, issue 5B, 2008, Pages 260~267
As pervious the SAR(Security Aware Routing) protocol is an secure Ad Hoc network protocol that finds a secure path, it is the security routing protocol that uses the security level of nodes as the routing information. However, the SAR protocol sometimes transfers data through inefficient transmission paths because it always tries to find secure nodes for a safe transmission. Since it is a protocol based on AODV, it will cause transmission delay as researching of security routing path. when a node is out of the data transmission range as its battery dying or movement. Although it is possible to connection of nodes because a characteristic of the SAR protocol, the connection is not easy to reconnect when the security level of intermediate node is lower than the level requested by a source node. In this paper, we suggest the MP-SAR based on the SAR to solve the SAR protocol's problem. The MP-SAR seeks multiple secure path for maintenance of data confidentiality using the expanded secure path detection techniques based on the SAR. It can transfer data quickly and reliably by using the shortest efficient path among multiple paths. In the research result, we proved a outstanding performance of MP-SAR than the previous SAR through comparison and analysis.
A Soft Handover Scheme Between UMTS and WLAN
Seo, Won-Kyeong ; Lee, Kang-Won ; Cho, You-Ze ;
The Journal of Korean Institute of Communications and Information Sciences, volume 33, issue 5B, 2008, Pages 268~274
With the advances in wireless communication technologies, mobile users require to get seamless services anywhere and anytime. To relize these demands, network interworking and vertical handover are necessary between heterogeneous wireless access technologies with multi-interface mobile station. A lot of organizations are doing research on the network integration schemes based on loosely and tightly integrated architectures, and research on vertical handover schemes mainly based on Mobile IP in loosely integrated environments. But actually, the tightly integrated scheme can support more faster vertical handover because heterogeneous access networks are combined tightly. However, vertical handover schemes in tightly integrated environments are conceptually proposed without any detail signaling procedures. Therefore, this paper defines a tightly integrated architecture between UMTS and WLAN, and proposes a soft vertical handover signaling procedure. The proposed soft vertical handover scheme is evaluated by the OPNET simulator, and we confirm the proposed scheme can support seamless services.
Design and Implementation of a Management Framework for Ubiquitous Home Networks
Kim, Dae-Young ; Lee, Jong-Eon ; Cha, Si-Ho ; Cho, Kuk-Hyun ;
The Journal of Korean Institute of Communications and Information Sciences, volume 33, issue 5B, 2008, Pages 275~284
In this paper we design and implement a management framework base on JMX to control and manage ubiquitous home networks. To do this, we organize the ubiquitous home network test-bed that consists of information electronics and sensor devices. In the test-bed network, we implement the management framework which can control and manage various applications and devices in home network environment. In addition, it can also define and add new services easily. Moreover, it is possible to provide various management interfaces with multi-protocols. The framework is formed to integrate legacy management systems readily.
Balanced Binary Search Using Prefix Vector for IP Address Lookup
Kim, Hyeong-Gee ; Lim, Hye-Sook ;
The Journal of Korean Institute of Communications and Information Sciences, volume 33, issue 5B, 2008, Pages 285~295
Internet routers perform packet forwarding which determines a next hop for each incoming packet using the packet's destination IP address. IP address lookup becomes one of the major challenges because it should be performed in wire-speed for every incoming packet under the circumstance of the advancement in link technologies and the growth of the number of the Internet users. Many binary search algorithms have been proposed for fast IP address lookup. However, tree-based binary search algorithms are usually unbalanced, and they do not provide very good search performance. Even for binary search algorithms providing balanced search, they have drawbacks requiring prefix duplication. In this paper, a new binary search algorithm which provides the balanced binary search and the number of its entries is much less than the number of original prefixes. This is possible because of composing the binary search tree only with disjoint prefixes of the prefix set. Each node has a prefix vector that has the prefix nesting information. The number of memory accesses of the proposed algorithm becomes much less than that of prior binary search algorithms, and hence its performance for IP address lookup is considerably improved.
A Novel Scheme for an RSVP Session Handoff in Wireless IP Networks with Micro-Mobility
Kim, Jeong-Hoe ; Min, Sang-Won ;
The Journal of Korean Institute of Communications and Information Sciences, volume 33, issue 5B, 2008, Pages 296~303
In this paper, we propose a novel Route_Reconf message as the RSVP message to maintain an RSVP session for hard handoff and consider a path-comparing route(PCR) algorithm to find an intermediate node in the charge of down-link re-establishment. And, we consider information form each mode for the PCR algorithm, which also reduces the frequency and amount of exchanged RSVP message to minimize packet loss and delay between an intermediate node and a receiver. According to the proposed algorithm, a new support node(NSN) and an existing support node(ESN) along the RSVP path can be found; the former is a supporting RSVP session node newly searched and the latter is the last supporting node holding the previous session after handoff. On receiving the Route_Reconf message at the ESN, a new allocated route from a NSN to the MN waiting for the handoff via a new access router is configured by the ESN.
A Study on Traffic Anomaly Detection Scheme Based Time Series Model
Cho, Kang-Hong ; Lee, Do-Hoon ;
The Journal of Korean Institute of Communications and Information Sciences, volume 33, issue 5B, 2008, Pages 304~309
This paper propose the traffic anomaly detection scheme based time series model. We apply ARIMA prediction model to this scheme and transform the value of the abnormal symptom into the probability value to maximize the traffic anomaly symptom detection. For this, we have evaluated the abnormal detection performance for the proposed model using total traffic and web traffic included the attack traffic. We will expect to have an great effect if this scheme is included in some network based intrusion detection system.
Limited Contention Scheme(LCS) to Reduce Collision in LR-WPAN
Ko, Su-Hwan ; Lee, Jong-Kyu ;
The Journal of Korean Institute of Communications and Information Sciences, volume 33, issue 5B, 2008, Pages 310~317
Data collision in LR-WPAN(Low Rate Wireless Personal Area Network) causes retransmission of which energy consumption may reduce life of the entire network. Furthermore LR-WPAN is very sensitive to collision as it has relatively fewer frequencies of backoff retries. LCS(Limited Contention Scheme) suggested in this study is a way to transmit data by certain groups of the total nodes so that it can reduce possibilities of data collision and retransmission by decreasing the number of competing nodes. As a result LCS can increase a throughput and the life of the entire network. As using LCS in designing LR-WPAN in the future can extend battery life, LCS can be useful in any application that requires low energy consumption.
Adaptive Contention Window Mechanism for Enhancing Throughput in HomePlug AV Networks
Yoon, Sung-Guk ; Yun, Jeong-Kyun ; Kim, Byung-Seung ; Bahk, Sae-Woong ;
The Journal of Korean Institute of Communications and Information Sciences, volume 33, issue 5B, 2008, Pages 318~325
HomePlug AV(HPAV) is the standard for distribution of Audio/video content as well as data within the home by using the power line. It uses a hybrid access mechanism that combines TDMA with CSMA/CA for MAC technology. The CSMA/CA protocol in HPAV has two main control blobs that can be used for access control: contention window(CW) size and deferral counter(DC). In this paper, we extensively investigate the impacts of CW and DC on performance through simulations, and propose an adaptive mechanism that adjusts the CW size to enhance the throughput in HPAV MAC. We find that the CW size is more influential on performance than the DC. Therefore, to make controlling the network easier, our proposal uses a default value of DC and adjusts the CW size. Our scheme simply increases or decreases the CW size if the network is too busy or too idle, respectively, We compare the performance of our proposal with those of the standard and other competitive schemes in terms of throughput and fairness. Our simulation and analysis results show that our adaptive CW mechanism performs very well under various scenarios.
Adaptive Timeout Scheduling for Energy-Efficient, Reliable Data Aggregation in Wireless Sensor Network
Baek, Jang-Woon ; Nam, Young-Jin ; Seo, Dae-Wha ;
The Journal of Korean Institute of Communications and Information Sciences, volume 33, issue 5B, 2008, Pages 326~333
In wireless sensor networks, a sensor node with in-network aggregation adjusts the timeout which is a waiting time to receive messages from child nodes. This paper proposes a novel timeout scheduling scheme for data aggregation in wireless sensor networks, which adaptively configures its timeout according to changing data patterns in order to improve energy efficiency and data accuracy during data aggregation. The proposed scheme decreases the timeout when the temporal difference of collected data(data variation) from children is lower than a pre-defined threshold because there is no occurrence of critical events. Conversely, it increases the timeout when the data variation is higher than the pre-defined threshold in order to fulfill more accurate data aggregation. Extensive simulation reveals that the proposed scheme outperforms the cascading-based scheme in terms of energy consumption and data accuracy.
A Universal Pricing Scheme for the WiMAX Services
Suk, Seung-Hak ; Lee, Hoon ; Lee, Kwang-Hui ;
The Journal of Korean Institute of Communications and Information Sciences, volume 33, issue 5B, 2008, Pages 334~343
In this work we propose a universal pricing machine, which incorporates a universal pricing framework for the future IEEE802.16 WiMAX service with multiple classes of service. A multimedia service is provided by a QoS provisioning scheme in the WiMAX network and universal pricing means that it can compute the price for any type of service in a unified framework. In the proposed pricing framework we incorporate multiple types of services such as the real time and nonreal time services that are supposed to be provided in the WiMAX network. To that purpose, let us first carry out an analysis on the current pricing scheme of Korean WiMAX service which incorporates only the data size. From that analysis we propose a new pricing scheme for the future WiMAX service that provides different service classes in the network. Via numerical experiment, we verify the implication of the work.
Performance Evaluation of DiffServ Networks Considering Self-Similar Traffic Characteristics
Park, Jeong-Sook ; Jeon, Yong-Hee ;
The Journal of Korean Institute of Communications and Information Sciences, volume 33, issue 5B, 2008, Pages 344~355
In this paper, we are dealing with the problems of performance evaluation of Differentiated Services(DiffServ) networks. For successful performance evaluation, the ability to accurately represent "real" traffic on the network by suitable traffic models is an essential ingredient. Many research results on the nature of real traffic measurements demonstrated LRD(long-range dependence) property for the Internet traffic including Web, TELNET, and P2P traffic. The LRD can be effectively represented by self-similarity. In this paper, we design and implement self-similar traffic generator using the aggregated On/Off source model, based on the analysis of the On-Off source model, FFT-FGN(Fast Fourier Transform-Fractional Gaussian Noise) model, and RMD(Random Midpoint Displacement) model. We confirmed the self-similarity of our generated traffic by checking the packet inter-arrival time of TCPdump data. Further we applied the implemented traffic generator to the performance evaluation of DiffServ networks and observed the effect of performance to the a value of the On/Off model, and performance of EF/BE class traffic by CBQ.
An International Comparison Study of Universal Service Support Mechanisms and Duplications
Byun, Jae-Ho ;
The Journal of Korean Institute of Communications and Information Sciences, volume 33, issue 5B, 2008, Pages 356~363
The decision of the USA to found the USF(Universal Service Fund) in 1983, which was aiming to support basic telecommunication services provision at affordable price in rural and high cost areas, has triggered many countries to introduce universal service support mechanisms. Korea has been also operating a universal service support mechanism since 2000 but there are lively controversies on the change of the existing support mechanism. This paper, first, will review universal service support mechanisms in major countries including USA, EU, Chile, Peru and Japan. Second, this paper will classify types of the mechanisms and review merits and demerits of the mechanisms. Finally, this paper will derive some implications for the improvement of domestic Mechanism.
DEA Models and Application Procedure for Performance Evaluation on Governmental Funding Projects for IT Small and Medium-sized Enterprises with Exogenously Fixed Variables of Corporate Competency
Park, Sung-Min ; Kim, Heon ;
The Journal of Korean Institute of Communications and Information Sciences, volume 33, issue 5B, 2008, Pages 364~378
Data Envelopment Analysis(DEA) models can be used for performance evaluation on governmental funding projects for IT small and medium-sized enterprises associated with multiple-outputs/multiple-inputs. In order to enhance the accuracy of DEA efficiency scores, DEA models with exogenously fixed variables are required where the corporate competency is taken into account. Additionally, it is necessary to use multiple DEA basic as well as extended models so as to relax the restriction on the performance evaluation to relying on a single DEA model. In this study; 1)a DEA data structure is designed including exogenously fixed variables representing corporate asset, revenue and the number of employees at the point in time that the governmental funding project concerned is initiated; 2)DEA basic as well as extended models are established according to the DEA data structure presented abovementioned; and 3)a case study is illustrated with an empirical testbed dataset. As for the DEA basic models, CCR, BCC, Super-efficiency model are adopted. The DEA extended models are developed based on the models associated with noncontrollable and nondiscretionary variables. In the case study, it is explained a comparison of DEA models and also major numerical outcomes such as efficiency scores, ranks derived from each DEA model are integrated using Analytic Hierarchy Process(AHP) weights. Performance significance with DEA efficiency scores between technical categories are tested based not only on parametric but also nonparametric single-factor analysis of variance method.
Design and Implementation of Electronic Medical Record System Based on HL7-CDA for the Exchange of Clinical Information
Cho, Ik-Sung ; Kwon, Hyeog-Soong ;
The Journal of Korean Institute of Communications and Information Sciences, volume 33, issue 5B, 2008, Pages 379~385
For the sharing and exchange of information between medical clinics, the clinical document has to be built on a standardized protocol such as a HL7-CDA. But it is difficult to exchange information between medical clinics because clinical document such as electronic medical record that include text and image, have different structure of document and type of expression. In this paper, we propose the electronic medical record system based on HL7-CDA that can share and exchange clinical information between medical institute. For this purpose, we have to design the schema of the clinical document architecture after we select the essential items of medical record and define templates. The proposed system can minimize integrating process and save parsing time when clinical information exchange and refer, by converting electronic medical record to base64 encoding scheme and integrate it in a XML document.
A Study of Privacy Protection Awareness of Mobile Phone Users
Rhee, Hae-Kyung ;
The Journal of Korean Institute of Communications and Information Sciences, volume 33, issue 5B, 2008, Pages 386~394
Adoption of wireless communication facilities in mobile devices leads to increased vulnerability in individual privacy. One of such cases was discovered when a smart mobile phone of Paris Hilton at Oscar Award Ceremony was hacked a Swedish group of hackers. In this study, I wondered what sort of personal information could be exposed to hackers in such cases. In the course of survey, it was recognized that technical analysis of flash memory in mobile devices to check what kinds of data are stored there is technically almost impossible, since they are usually built in a proprietary manner. No generic tools could apply to discover their contents. Having recognized technical difficulties, it was inevitable to resort to a questionnaire survey to see awareness level with regard to personal privacy. We collected response from three hundred respondents by posting the questionnaire at World Survey on-line research site. What we have discovered was quite astonishing that even personal residence registration numbers have been found from nine of every ten respondents. Other data revealed include phone numbers, names, and personal bank accounts.