Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The KIPS Transactions:PartC
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Volume & Issues
Volume 15C, Issue 6 - Dec 2008
Volume 15C, Issue 5 - Oct 2008
Volume 15C, Issue 4 - Aug 2008
Volume 15C, Issue 3 - Jun 2008
Volume 15C, Issue 2 - Apr 2008
Volume 15C, Issue 1 - Feb 2008
Selecting the target year
A Packet Distribution Routing for Balancing Energy-Consumption in MANET
Jin, Dong-Xue ; Choi, Yong-Jun ; Park, Hee-Joo ; Kim, Chong-Gun ;
The KIPS Transactions:PartC, volume 15C, issue 2, 2008, Pages 79~86
DOI : 10.3745/KIPSTC.2008.15-C.2.079
MANET(Mobile Ad hoc Network) is a collection of two or more nodes equipped with wireless communications and constrained by the factor of energy limitation. The running out of energy on some nodes may bring down the performance of network seriously. For solving the problems above, this paper uses completely separated Node-Disjoint multipaths from a source to a destination as many as possible. And, based on average, minimum or variance of energy values on the each multipath, the packets are distributed on paths. Generally, collecting methods for energy information can be classified into two main categories, Static and Dynamic. As the different energy values collected, the packet distribution methods are classified into six criteria, Static-Average, Static-Minimum, Static-Variance, Dynamic-Average, Dynamic-Minimum and Dynamic-Variance respectively. The performance of the packet distribution methods and that of AODV are compared by NS2 simulation.
Session Control Mechanism for Peer-to-Peer IPTV Services
Park, Seung-Chul ;
The KIPS Transactions:PartC, volume 15C, issue 2, 2008, Pages 87~92
DOI : 10.3745/KIPSTC.2008.15-C.2.087
This paper proposes a session control model for the P2P(Peer to Peer) IPTV(Internet Protocol Television) services and presents the IPTV session control procedures based on the proposed model. Since, while public IPTV traffic is usually processed via a separate network, P2P IPTV traffic is processed together with the conventional Internet access traffic, the P2P IPTV control mechanism needs to provide multi-stream processing for the constituent TPS(Triple Play Service) traffic and corresponding QoS(Quality of Service) control functions. Besides, P2P IPTV session control mechanism should provide appropriate multicast control functions in order to support effective transmission of video traffic generated by personal IPTV broadcasters. The P2P IPTV session control model proposed in this paper is designed to be based on the standard SIP(Session Initiation Protocol), IGMP(Internet Group Management Protocol), and COPS(Common Open Policy Service) protocol so that it can contribute to the easy and prompt deployment of inter-operable P2P IPTV platform.
Enterprise Network Weather Map System using SNMP
Kim, Myung-Sup ; Kim, Sung-Yun ; Park, Jun-Sang ; Choi, Kyung-Jun ;
The KIPS Transactions:PartC, volume 15C, issue 2, 2008, Pages 93~102
DOI : 10.3745/KIPSTC.2008.15-C.2.093
The network weather map and bandwidth time-series graph are popularly used to understand the current and past traffic condition of NSP, ISP, and enterprise networks. These systems collect traffic performance data from a SNMP agent running on the network devices such as routers and switches, store the gathered information into a DB, and display the network performance status in the form of a time-series graph or a network weather map using Web user interface. Most of current enterprise networks are constructed in the form of a hierarchical tree-like structure with multi-Gbps Ethernet links, which is quietly different from the national or world-wide backbone network structure. This paper focuses on the network weather map for current enterprise network. We start with the considering points in developing a network weather map system suitable for enterprise network. Based on these considerings, this paper proposes the best way of using SNMP in constructing a network weather map system. To prove our idea, we designed and developed a network weather map system for our campus network, which is also described in detail.
Design and Implementation of an Efficient Management Scheme for VoIP Terminals in SOHO Environments
Jin, Sang-Woo ; Gyeong, Gye-Hyeon ; Ko, Kwang-Sun ; Eom, Young-Ik ;
The KIPS Transactions:PartC, volume 15C, issue 2, 2008, Pages 103~110
DOI : 10.3745/KIPSTC.2008.15-C.2.103
Internet telephone uses VoIP as its communication protocol, where it provides various additional services with inexpensive fare when the terminal is connected to the Internet. The existing auto provisioning systems that manage Internet telephone terminals are targeting large size VoIP service providers or enterprises, and has few consideration on the convenience of management for small size environments. The difficult installation and management procedures of the current auto provisioning systems prevents Internet telephone system from getting popular. Easy installation and management system is needed in order to spread out Internet telephone system. In this paper, we design and implement the auto provisioning system that provides easy installation and management services in small size environments such as SOHO environments.
Maximizing Bandwidth Utilization by Sharing Method of SSID Hiding in Multiple Wireless Routers
Yoon, Young-Hyo ; Kim, Myung-Won ; Kwak, Hu-Keun ; Chung, Kyu-Sik ;
The KIPS Transactions:PartC, volume 15C, issue 2, 2008, Pages 111~118
DOI : 10.3745/KIPSTC.2008.15-C.2.111
A wireless router is a device which allows several wireless clients to share an internet line using NAT (Network Address Translation). In a school or a small office environment where many clients use multiple wireless routers, a client may select any one of wireless routers so that most clients can be clustered to a small set of the wireless routers. In such a case, there exists load unbalancing problem between clients and wireless routers. One of its result is that clients using the busiest router get poor service. The other is that the resource utilization of the whole wireless routers becomes very low. In order to resolve the problems, we propose a load sharing scheme to maximize network bandwidth utilization based on SSID(Service Set IDentifier) hiding. The proposed scheme keeps checking the available bandwidth of all the possible wireless routers in a time interval and select the most available one. If a new client appears, the most available router is visible to him or her whereas the others are not visible. This is handled by SSID hiding in the proposed scheme. We implemented the proposed scheme with ASUS WL 500G wireless router and performed experiments. Experimental results show the bandwidth utilization improvement compared to the existing method.
A Novel Clustering Method for Increasing Connection Durability in Sensor Network Environment
Kim, Dae-Hyun ; Kim, Jin-Mook ; Lee, Kyung-Oh ;
The KIPS Transactions:PartC, volume 15C, issue 2, 2008, Pages 119~124
DOI : 10.3745/KIPSTC.2008.15-C.2.119
The LEACH is a study method of a clustering base that was representative in many routing techniques that was suggested in sensor network environment. This is suggested technique to manage the sensor network group which consisted of many sensors in efficiency. However, it does not consider energy remaining quantity of the cluster header to manage cluster group, the problem where the cluster group is able to destroyed on the middle which transmits data. We are going to propose to solve such a problem by this paper for new clustering technique to accomplish management for a cluster group. It uses the technique which it proposes from the dissertation which it sees and are to the data transfer and the control also the connection directivity of the cluster group to improve also the lag time diminishes, test result it will lead and the possibility which it will know it was.
Analysis on Vulnerability of ID/PW Management Solution and Proposal of the Evaluation Criteria
Han, Jeong-Hoon ; Lee, Byung-Hee ; Hong, Su-Min ; Kim, Seung-Hyun ; Won, Dong-Ho ; Kim, Seung-Joo ;
The KIPS Transactions:PartC, volume 15C, issue 2, 2008, Pages 125~132
DOI : 10.3745/KIPSTC.2008.15-C.2.125
As the development of Internet technology, the number of IDs managed by each individuals has been increased. And many software development institutes have developed ID/PW management solutions to facilitate secure and convenient management of ID/PW. However, these solutions also can be vulnerable in case of administrator`s password exposure. Thus, we need to derive security requirements from the vulnerability analysis of these solutions, also we need evaluation criteria for secure ID/PW management solution development. In this paper, we analyze the vulnerability of ID/PW management solution and propose the evaluation criteria for secure ID/PW management solution.
VLSI Architecture for High Speed Implementation of Elliptic Curve Cryptographic Systems
Kim, Chang-Hoon ;
The KIPS Transactions:PartC, volume 15C, issue 2, 2008, Pages 133~140
DOI : 10.3745/KIPSTC.2008.15-C.2.133
In this paper, we propose a high performance elliptic curve cryptographic processor over
. The proposed architecture is based on a modified Lopez-Dahab elliptic curve point multiplication algorithm and uses Gaussian normal basis for
field arithmetic. To achieve a high throughput rates, we design two new word-level arithmetic units over
and derive a parallelized elliptic curve point doubling and point addition algorithm with uniform addressing based on the Lopez-Dahab method. We implement our design using Xilinx XC4VLX80 FPGA device which uses 24,263 slices and has a maximum frequency of 143MHz. Our design is roughly 4.8 times faster with 2 times increased hardware complexity compared with the previous hardware implementation proposed by Shu. et. al. Therefore, the proposed elliptic curve cryptographic processor is well suited to elliptic curve cryptosystems requiring high throughput rates such as network processors and web servers.