Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The KIPS Transactions:PartC
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Volume & Issues
Volume 12C, Issue 7 - Dec 2005
Volume 12C, Issue 6 - Oct 2005
Volume 12C, Issue 5 - Oct 2005
Volume 12C, Issue 4 - Aug 2005
Volume 12C, Issue 3 - Jun 2005
Volume 12C, Issue 2 - Apr 2005
Volume 12C, Issue 1 - Feb 2005
Selecting the target year
A Reliable Web Service Support Mechanism based on Asynchronous Architecture in BcN
Kim Hyoung-min ; Jung Yeu-hun ; Kim Hwa-sung ;
The KIPS Transactions:PartC, volume 12C, issue 6, 2005, Pages 773~780
DOI : 10.3745/KIPSTC.2005.12C.6.773
Recently, the telecommunication network is in a transition toward the BcN (Broadband convergence Networks) that integrates the Internet, the telecommunication and the broadcasting. The BcN makes it possible to provide of 4he third-party application by using the Open API The Parlay X API is an example of the Open API and the Parlay X API is grafted in the Web Service and is abstracted from the Parlay API. So, the Parlay X API does not only have advantages of a Web Service, but also disadvantages of the Web Service. The main disadvantage of the Web Service is that it does not support the any QoS mechanism. In this paper, we propose the architecture that solves the reliability among the QoS issues for the Web Service. The proposed mechanism adopts the Asynchronous architecture for the reliable Web Service and improves the performance of the retransmission between the client and the server using the expected response time. We perform the performance evaluation through the simulation in older to compare with the existing mechanism. Consequently, we can confirm that the performance of the proposed mechanism performs better than the existing mechanism.
An Architecture for User Level End-to-end QoS using Overlay in NGN
Lee Jihyun ; Lim Kyungshik ; Oh Hangseok ; Nam Taekyong ;
The KIPS Transactions:PartC, volume 12C, issue 6, 2005, Pages 781~792
DOI : 10.3745/KIPSTC.2005.12C.6.781
This study proposes an Architecture for user level End-to-end Quality of Service(QoS) using overlay In Next Generation Network(NGN). Inexisting NGNs, the IMS of a control plane provides user QoS through direct traffic control and resource-reservation over the IP packet transport network of a user plane. Further, a set of torrent studies are ongoing not only to maximize the QoS for users, but also to minimize the quality deterioration for supporting the user End-to-end QoS. Along with that, an extended QoS in user level must be considered, for Instance, differentiating service quality to support users' expectation, providing optimized contents by users' equipments, and so forth. Accordingly, the Overlay Service Network Architecture proposed by this study provides protocol adaptation for maximum throughput on transport layer by using the most efficient transport layer protocol to various network circumstances. Also, the Overlay Service Network Architecture on application layer distributes processing delay from the data transformation process of the user equipment to the network, and it is capable of intermediate processing depending on user service level. application service feature, and equipment circumstance as well. Thus, this study mainly proposes the Overlay Service Network Architecture for user level end-to-end QoS in NGN with the quality control features both on the transport layer and the application layer, an internal component feature, and a service scenario providing the QoS linking with 3GPP.
Admission Control Method for Efficient Multicast Service in BcN Environment
Jo, Seng-Kyoun ; Choi, Seong-Gon ; Choi, Jun-Hyun ;
The KIPS Transactions:PartC, volume 12C, issue 6, 2005, Pages 793~798
DOI : 10.3745/KIPSTC.2005.12C.6.793
We focus on the RP (Rendezvous Point) system model in the multicast network based on BcN (Broadband Convergence Network) integrating broadcasting, telecommunication and Internet with one. Based on the condition multiple queues with different service and single server, when the arrivals tome in group with the site of the group geometrically distributed, we define the relationship between incoming arrival rate and corresponding buffer size. We also investigate the Profit according to both Service Provider and Network Operator Then we make a decision whether a new service request is accepted or not based on given interning rate range.
A Handover Scheme for Seamless Service Support between Wired and Wireless Networks over BcN
Yang, Ok-Sik ; Choi, Seong-Gon ; Choi, Jun-Kyun ;
The KIPS Transactions:PartC, volume 12C, issue 6, 2005, Pages 799~808
DOI : 10.3745/KIPSTC.2005.12C.6.799
This paper proposes low latency handover procedure for seamless connectivity and QoS support between wired (e.g. Ethernet) and wireless (e.g. WLAN, WiBro(802.16-compatible), CDMA) networks by the mobile-assisted and server-initiated handover strategy. It is assumed that the server decides the best target network considering network status and user preferences. In this algorithm a mobile terminal associates with the wireless link decided at the server In advance and receives CoA as well. When handover occurs without the prediction in wired networks, the server performs fast binding update using physical handover trigger through the MIH(media independent handover) function. As a result, a mobile terminal does not need to perform L2 and L3 handover during handover so that this procedure decreases handover latency and loss.
Address Auto-configuration in Broadband Convergence Networks for Supporting Multi-Hop User Access Networks
Park, Il-Kyun ; Kim, Young-Han ;
The KIPS Transactions:PartC, volume 12C, issue 6, 2005, Pages 809~816
DOI : 10.3745/KIPSTC.2005.12C.6.809
MANET(mobile ad hoc network) cn be one of the access networks of BcN(broadband convergence network), and an user node requires address auto-configuration protocol for mu14i-hop environment. Some address auto-configuration protocols are proposed for independent MANET, but they don't consider BcN-accessable MANET environment. In this paper, new address auto-configuration protocol for wireless nodes is proposed. With this proposal, they ran configure their global addresses automatically in hybrid MANETs as BcN access networks. The autoconfiguration protocol modifies IPv6 NDP(neighbor discovery protocol) messages to deliver global prefix information to all wireless nodes, and avoids message boradcasting to minimize network overhead.
Multi-Domain Security Management Framework and Its Performance Evaluation for Protecting BcN Infrastructure
Jang Jung-Sook ; Jeon Yong-Hee ; Jang Jong-Soo ;
The KIPS Transactions:PartC, volume 12C, issue 6, 2005, Pages 817~826
DOI : 10.3745/KIPSTC.2005.12C.6.817
BcN(Broadband convergence Network) is being developed in order to support a variety of network applications, with enhanced capabilities of QoS(Quality of Service) provisioning and security, and IPv6. In a high-speed network environment such as BcN, it if more likely for the network resources to be exposed to various intrusion activities. The propagation speed of intrusion is alto expected to be much faster than in the existing Internet In this paper, we present a multi-domain security management framework which my be used for a global intrusion detection at multiple domains of BcN and describe its characteristics. For the performance evaluation, we first present test results for the security node and compare with other products. Then we design and Implement an OPNET simulator for the proposed framework, and present some simulation results. In the simulation model, we focus on the performance of alert information in the security overlay network.
A Statistic-based Response System against DDoS Using Legitimated IP Table
Park, Pilyong ; Hong, Choong-Seon ; Choi, Sanghyun ;
The KIPS Transactions:PartC, volume 12C, issue 6, 2005, Pages 827~838
DOI : 10.3745/KIPSTC.2005.12C.6.827
DDoS (Distributed Denial of Service) attack is a critical threat to current Internet. To solve the detection and response of DDoS attack on BcN, we have investigated detection algorithms of DDoS and Implemented anomaly detection modules. Recently too many technologies of the detection and prevention have developed, but it is difficult that the IDS distinguishes normal traffic from the DDoS attack Therefore, when the DDoS attack is detected by the IDS, the firewall just discards all over-bounded traffic for a victim or absolutely decreases the threshold of the router. That is just only a method for preventing the DDoS attack. This paper proposed the mechanism of response for the legitimated clients to be protected Then, we have designed and implemented the statistic based system that has the automated detection and response functionality against DDoS on Linux Zebra router environment.
Modeling the Spread of Internet Worms on High-speed Networks
Shin Weon ;
The KIPS Transactions:PartC, volume 12C, issue 6, 2005, Pages 839~846
DOI : 10.3745/KIPSTC.2005.12C.6.839
Recently broadband convergence network technology is emerging as an integrated network of telecommunication, broadcasting and Internet. But there are various threats as side effects against the growth of information technology, and malicious codes such af Internet worms may bring about confusions to upset a national backbone network. In this paper, we survey the traditional spreading models and propose a new worm spreading model on Internet environment. We also analyze the spreading effects due to tile spread period and the response period of Internet worms. The proposed model leads to a better prediction of the scale and speed of worm spreading. It can be applied to high-speed network such as broadband convergence network.
Reducing False Alarm and Shortening Worm Detection Time in Virus Throttling
Shim Jae-Hong ; Kim Jang-bok ; Choi Hyung-Hee ; Jung Gi-Hyun ;
The KIPS Transactions:PartC, volume 12C, issue 6, 2005, Pages 847~854
DOI : 10.3745/KIPSTC.2005.12C.6.847
Since the propagation speed of the Internet worms is quite fast, worm detection in early propagation stage is very important for reducing the damage. Virus throttling technique, one of many early worm detection techniques, detects the Internet worm propagation by limiting the connection requests within a certain ratio.[6, 7] The typical throttling technique increases the possibility of false detection by treating destination IP addresses independently in their delay queue managements. In addition, it uses a simple decision strategy that determines a worn intrusion if the delay queue is overflown. This paper proposes a two dimensional delay queue management technique in which the sessions with the same destination IP are linked and thus a IP is not stored more than once. The virus throttling technique with the proposed delay queue management can reduce the possibility of false worm detection, compared with the typical throttling since the proposed technique never counts the number of a IP more than once when it chicks the length of delay queue. Moreover, this paper proposes a worm detection algorithm based on weighted average queue length for reducing worm detection time and the number of worm packets, without increasing the length of delay queue. Through deep experiments, it is verified that the proposed technique taking account of the length of past delay queue as well as current delay queue forecasts the worn propagation earlier than the typical iuぉ throttling techniques do.
Modeling and Performance Analysis on the Response Capacity against Alert Information in an Intrusion Detection System
Jeon Yong-Hee ; Jang Jung-Sook ; Jang Jong-Soo ;
The KIPS Transactions:PartC, volume 12C, issue 6, 2005, Pages 855~864
DOI : 10.3745/KIPSTC.2005.12C.6.855
In this paper, we propose an intrusion detection system(IDS) architecture which can detect and respond against the generation of abnormal traffic such as malicious code and Internet worms. We model the system, design and implement a simulator using OPNET Modeller, for the performance analysis on the response capacity of alert information in the proposed system. At first, we model the arrival process of alert information resulted from abnormal traffic. In order to model the situation in which alert information is intensively produced, we apply the IBP(Interrupted Bernoulli Process) which may represent well the burstiness of traffic. Then we perform the simulation in order to gain some quantitative understanding of the system for our performance parameters. Based on the results of the performance analysis, we analyze factors which may hinder in accelerating the speed of security node, and would like to present some methods to enhance performance.
Design and Implementation of Sensor based Intrusion Detection System
Choi, Jong-Moo ; Cho, Seong-Je ;
The KIPS Transactions:PartC, volume 12C, issue 6, 2005, Pages 865~874
DOI : 10.3745/KIPSTC.2005.12C.6.865
The information stored in the computer system needs to be protected from unauthorized access, malicious destruction or alteration and accidental inconsistency. In this paper, we propose an intrusion detection system based on sensor concept for defecting and preventing malicious attacks We use software sensor objects which consist of sensor file for each important directory and sensor data for each secret file. Every sensor object is a sort of trap against the attack and it's touch tan be considered as an intrusion. The proposed system is a new challenge of setting up traps against most interception threats that try to copy or read illicitly programs or data. We have implemented the proposed system on the Linux operating system using loadable kernel module technique. The proposed system combines host~based detection approach and network-based one to achieve reasonably complete coverage, which makes it possible to detect unknown interception threats.
Dynamic-size Multi-hop Clustering Mechanism in Sensor Networks
Lim, Yu-Jin ; Ahn, Sang-Hyun ;
The KIPS Transactions:PartC, volume 12C, issue 6, 2005, Pages 875~880
DOI : 10.3745/KIPSTC.2005.12C.6.875
One of the most important issues in the sensor network with resource-constrained sensor nodes is prolonging the network lifetime by efficiently utilizing the given energy of nodes. The most representative mechanism to achieve a long-lived network is the clustering mechanism. In this paper, we propose a new dynamic-size multi-hop clustering mechanism in which the burden of a node acting as a cluster head(CH) is balanced regardless of the density of nodes in a sensor network by adjusting the size of a cluster based on the information about the communication load and the residual energy of the node and its neighboring nodes. We show that our proposed scheme outperforms other single-hop or fixed-size multi-hop clustering mechanisms by carrying out simulations.
A Study on Framework to offer the differentiated Optical QoS Service in the Next-Generation WDM Optical Internet Backbone Network
Kim Yong-Seoug ; Ryu Shi-Kook ; Lee Jae-Dong ; Kim Sung-Un ;
The KIPS Transactions:PartC, volume 12C, issue 6, 2005, Pages 881~890
DOI : 10.3745/KIPSTC.2005.12C.6.881
Over for the past 10 years, the increase in geometric progression for the internet traffic, has allowed the IP protocol framework to be the most important network technology. In addition, the internet service is being developed as a service mode differentiated, aiming to support the new-mode real-time multimedia services such as internet phone, video conference, cyber reality, and internet game, focusing on offering a latest service. These days, aiming to solve the need for broad bandwidth along with guaranteeing QoS, the WDM technology of offering multiple gigabit wavelengths is emerging as the core technology of next-generation optical internet backbone network. In the next-generation optical internet backbone network based on WDM, the QoS framework is one of fore subjects aiming to offer a service of guaranteeing QoS This study analyzes the requirements of performance related to QoS framework in IP Subnet and in WDM optical backbone network, and suggests optical QoS service framework differentiated. in order to guarantee end-to-end QoS through the next-generation optical internet backbone network, using GMPLS control protocol.
WDM Optical Network Restoration and Spare Resource Planning using Multiple Ring-Cover
Hwang, Ho-Young ; Lim, Sung-Soo ;
The KIPS Transactions:PartC, volume 12C, issue 6, 2005, Pages 891~900
DOI : 10.3745/KIPSTC.2005.12C.6.891
This paper studies network recovery methods for WDM optical mesh networks, concentrating on improving spare resource utilization. The resource efficiency can be obtained by sharing spare resources needed for network recovery. To improve the sharability of spare resources in WDM networks, methods to share backup paths us well as spare capacity should be studied. The proposed method in this paper uses multiple ring-covers and this method provides fast and simple recovery operation by exploiting the characteristics of logical ring topology, and also provides efficient resource utilization by using multiple distributed backup paths to improve the sharability of overall spare resources in the networks. This method can provide layered reliability to network service by enabling hierarchical robustness against multiple failures. The performance results show that the proposed method provide improved resource efficiency for single failure and enhanced robustness for multiple failures.
A study on Multi-code Spread Spectrum System and its adaptation using MHCOC
Kong Hyung-Yun ; Nam Doo-Hee ;
The KIPS Transactions:PartC, volume 12C, issue 6, 2005, Pages 901~906
DOI : 10.3745/KIPSTC.2005.12C.6.901
In this paper, we propose a novel MHCOC (Mapped High Capacity Orthogonal Code) SS(Spread Spectrum) technique that reduces high PAPR (Peak power to Average Power Ratio) of HCOC SS system which was proposed to support high data rate transmission, and we compare to the conventional modulation technique such as MQAM SS that can transmit the same number of symbols at the same time. Moreover, we study on adaptation of this system to satisfy QoS (Quality of Service) that services the proper data rate according to the propagation channel quality information. We perform computer simulation to verify the performance of the proposed system and analyze its availability.
Multicast Tree Construction Scheme considering QoS on the Application Layer Multicast based on RMCP
Park Si-Yong ; Kim Sung-Min ; Chung Ki-Dong ;
The KIPS Transactions:PartC, volume 12C, issue 6, 2005, Pages 907~916
DOI : 10.3745/KIPSTC.2005.12C.6.907
RMCP is an application layer multicast protocol and was established as a standard by ITU-T Also, RMCP includes a scheme which can statically construct a multicast tree. In this paper, we propose a QoS based tree construction scheme which can dynamically construct a multicast tree. And this scheme shows more superior performance than the static tree scheme of RMCP in terms of start-up delay and user requirement QoS. This scheme consists of a best-fit method using multiple sub-net groups which are satisfied a user requirement QoS and a first-fit method using one sub-net group which has maximum transmission bandwidth. In simulation result, two proposed methods are superior to the existing static tree scheme.
A Transport Layer Mobility Support Approach for Multimedia Streaming Services
Jang, Moon-Jeong ; Lee, Mee-Jeong ;
The KIPS Transactions:PartC, volume 12C, issue 6, 2005, Pages 917~926
DOI : 10.3745/KIPSTC.2005.12C.6.917
In this paper, we propose a transport layer mobility support protocol for multimedia streaming services in mobile/wireless environments by extending PR-SCTP to support mobility. We named the proposed scheme to be uPR-mSCTP. The rules related to provide unordered and unreliable data transfer, as well as an approach to minimize handover latency we proposed. Through the simulation results, it is shown that, since uPR-mSCTP reduces transmission rates during handover, not only it reduces the waste of network resources, but it also has the packet loss rate similar to FMIPv6, which is a lot smaller than UDP over MIPv6 or HMIPv6 It also incurs smaller control packet overhead compared to the network layer mobility support approaches.
Performance of a Partial Burst Retransmission Mechanism in OBS Networks
Um Tai-Won ; Choi Seong Gon ; Choi Jun Kyun ; Jeong Tae Soo ; Kang Sungsoo ;
The KIPS Transactions:PartC, volume 12C, issue 6, 2005, Pages 927~932
DOI : 10.3745/KIPSTC.2005.12C.6.927
We investigate the effects on performance of using a partial retransmission mechanism in Optical Burst Switched(OBS) networks. In our scheme, the lost segments of a burst are retransmitted in the OBS layer. We also propose an optical resource reservation using the partial retransmission mechanism. Our scheme attempts to improve the burst contention resolution and optical channel utilization. The performance of the proposed mechanism is analyzed by NS2 simulations. Simulation results indicate that link utilization of the OBS network is improved makedly at the expense of signaling and ingress buffers.
Framework for Automatic Generation of Network Management Program
Lee, Myung-Jin ; Kim, Eun-Hee ; Shin, Moon-Sun ; Lee, Eung-Jae ; Ryu, Keun-Ho ;
The KIPS Transactions:PartC, volume 12C, issue 6, 2005, Pages 933~940
DOI : 10.3745/KIPSTC.2005.12C.6.933
As the appearance of very high speed telecommunication network, volume of network, is enlarged and complicated, management of the various network equipments and hosting systems become more complicated and significant. Recently, there have been various researches on network management system that is capable of managing and operating the network environment based on SNMP (Simple Network Management Protocol). SNMP has many advantages, which is easy to implement and has a simple structure. However, as the network structure has become more complicated, it has caused a number of problems like the increase of network load and limit of the network management scope in terms of the network expansion and efficiency. Especially, it needs expensive cost and time for developing a network because many network developers are almost depended manually for developing it till now. In this paper, we propose a framework for network management program that automates the generation of information for network management. The Proposed framework is able to automatically generate a network management program by using information related with equipments which were provided along with the network equipments and SNMP library Thus, we ill make not only the SNMP network structure expansion become easier but also errors maintaining and development time of the network management program were dramatically reduced by using generated network program through our proposed framework.