Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 9, Issue 6 - Dec 2008
Volume 9, Issue 5 - Oct 2008
Volume 9, Issue 4 - Aug 2008
Volume 9, Issue 3 - Jun 2008
Volume 9, Issue 2 - Apr 2008
Volume 9, Issue 1 - Feb 2008
Selecting the target year
Design of Messenger Protocol, Implementation of Server and Analysis for Mobile Office Environment
On, Jin-Ho ; Choi, Wan ; Cho, Gi-Hwan ; Lee, Moon-Kun ;
Journal of Internet Computing and Services, volume 9, issue 2, 2008, Pages 1~13
Recently, interest about Mobile Office Environment is increasing Messenger system of 'Ubiquitous Mobile Office Environment' need various kinds new concept such os request/broadcasting/transmission of working environment that existent messenger protocol does not support. Design correct new protocol to Mobile Office Environment messenger in this treatise, and analyzed existentprotocol and comparison. Also, examine characteristic of rendezvous server that was optimized in MOE-MP protocol and analyzed efficiency. MOE-MP that design newly based on basic syntax of XMPP optimized to Mobile Office Environment.
A study of QoS for High Speed MIOQ Packet Switch
Ryu, Kyoung-Sook ; Choe, Byeong-Seog ;
Journal of Internet Computing and Services, volume 9, issue 2, 2008, Pages 15~23
This paper proposes the new structural MOQ(Multiple Input/Output-Queued) switch which guarantees QoS while maintaining high efficiency and deals with the Anti-Empty algorithm which is new arbitration algorithm to be used for the proposed switch. The new structure of the proposed switch based on MIQ, MOQ is designed to have the same buffer speed as the external line speed. Also, the proposed switch makes it possible to remove the weak point of existing methods and introduces the new method of the MOQ operation to support QoS. Therefore, this switch is equal to the Output Queued switch in efficiency and delay, and guarantees the high-speed switching supporting QoS without cell loss.
Synch. RA-based Uplink Packet Transmission in OFDMA Systems
Oh, Sang-Kyu ; Moon, Jin-Soo ; Shin, Seok-Joo ;
Journal of Internet Computing and Services, volume 9, issue 2, 2008, Pages 25~33
In this paper we propose uplink packet transmission scheme based on Synchronized RA. The scheme can afford to support diverse QoS required from diverse multimeda traffics. In order to minimze the collision probability occurred in contention based channel access, we assign a reservation access channel additionally to the traffic channels. Access probability function for controlling collisions occurred in the reservation access channel is applied. Through assigning different access probability to each traffic user with respect to priority issued by his required QoS, the proposed scheme guarantees minimum throughput required by higher priority users in the whole range of system load.
On NeMRI-Based Multicasting for Network Mobility
Kim, Moon-Seong ; Park, Jeong-Hoon ; Choo, Hyun-Seung ;
Journal of Internet Computing and Services, volume 9, issue 2, 2008, Pages 35~42
Mobile IP is a solution to support mobile nodes, however, it does not handle NEtwork MObility (NEMO). The NEMO Basic Support (NBS) protocol ensures session continuity for all the nodes in the mobile network. Since the protocol is based on Mobile IP, it inherits the same fundamental problem such as tunnel convergence, when supporting the multicast for NEMO. In this paper, we propose the multicast route optimization scheme for NEMO environment. We assume that the Mobile Router (MR) has a multicast function and the Nested Mobile Router Information (NeMRI) table. The NeMRI is used to record o list of the CoAs of all the MRs located below it. And it covers whether MRs desire multicast services. Any Route Optimization (RO) scheme can be employed here for pinball routing. Therefore, we achieve optimal routes for multicasting based on the given architecture. We also propose cost analytic models to evaluate the performance of our scheme. We observe significantly better multicast cost in NEMO compared with other techniques such as Bi-directional Tunneling, Remote Subscription, and Mobile Multicast based on the NBS protocol.
Transmission Control Scheme for Low Power Stations in IEEE 802.11b Wireless LAN
Song, Myong-Lyol ;
Journal of Internet Computing and Services, volume 9, issue 2, 2008, Pages 43~50
In IEEE 802.11b wireless LAN, stations keep synchronization by receiving beacons being periodically sent by the AP (access point) when they run in low power mode. Beacon transmission is delayed if wireless channel is busy at a scheduled TBTT (target beacon transmission time), and stations must be awake until they receive the delayed beacon. In this paper, we propose a scheme that stations get their transmission delayed if they have little time for successful data transmission by the next TBTT. Beacon transmission without delay is guaranteed at every TBTT with this method so that the awake time of low power stations to receive beacon can be reduced. The proposed method is simulated and its characteristics ore described with the analysis of the results. The measured results in terms of beacon delay show some enhancement in energy consumption.
Applied Method of Privacy Information Protection Mechanism in e-business environments
Hong, Seng-Phil ; Jang, Hyun-Me ;
Journal of Internet Computing and Services, volume 9, issue 2, 2008, Pages 51~59
Loaming Agreement based Localized Authentication for Nested NEMO Environment
Lim, Hyung-Jin ; Chung, Tai-Myoung ;
Journal of Internet Computing and Services, volume 9, issue 2, 2008, Pages 61~68
Authentication for inter-NEMO rooming is on important issue for achieving the seamless mobile networking. In this proposal, the technical challenge lies in the fact that a visited network does not initially have the authentication credentials of a roaming mobile router. This paper proposes an efficient approach for providing AAA service in NEMO environment. This approach uses localized authentication based on the roaming agreement between ISPs. A public key certificate structure is proposed, tailored to the business model of wireless internet Service Providers (ISPs). In this approach, the mutual authentication between a visited network and a roaming user can be performed locally without any control with user's home network. In conclusion, our protocol shown that communication delay can be reduced by overuse 45% overhead in communication delay than the previous AAA approach.
Response Methodology against Spoofed IP Attack using Active Networks Mechanism
Park, Sang-Hyun ; Ko, Haeng-Seok ; Kwon, Oh-Seok ;
Journal of Internet Computing and Services, volume 9, issue 2, 2008, Pages 69~81
It has become more difficult to correspond a cyber attack quickly as patterns of attack become various and complex. However, current security mechanism just have passive defense functionalities. In this paper, we propose new network security mechanism to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed mechanism makes it possible to deal effectively with cyber attacks such as IP spoofing, by using active packet technology including a mobile code on active network. Also, it is designed to hove more active correspondent than that of existing mechanisms. We implemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of attacker response framework using mobile code. The experimentation results are analyzed.
Dictionary Attack on Huang-Wei's Key Exchange and Authentication Scheme
Kim, Mi-Jin ; Nam, Jung-Hyun ; Won, Dong-Ho ;
Journal of Internet Computing and Services, volume 9, issue 2, 2008, Pages 83~88
Session initiation protocol (SIP) is an application-layer prolocol to initiate and control multimedia client session. When client ask to use a SIP service, they need to be authenticated in order to get service from the server. Authentication in a SIP application is the process in which a client agent present credentials to another SIP element to establish a session or be granted access to the network service. In 2005, Yang et al. proposed a key exchange and authentication scheme for use in SIP applications, which is based on the Diffie-Hellman protocol. But, Yang et al.'s scheme is not suitable for the hardware-limited client and severs, since it requires the protocol participant to perform significant amount of computations (i.e., four modular exponentiations). Based on this observation. Huang and Wei have recently proposed a new efficient key exchange and authentication scheme thor improves on Yang et al.'s scheme. As for security, Huang and Wei claimed, among others, that their scheme is resistant to offline dictionary attacks. However, the claim turned out to be untrue. In this paper, we show thor Huang and Wei's key exchange and authentication scheme is vulnerable to on offline dictionary attack and forward secrecy.
A Goal-oriented Test Data Generation for Programs with Pointers based on SAT
Chung, In-Sang ;
Journal of Internet Computing and Services, volume 9, issue 2, 2008, Pages 89~105
So far, most of research on automated test data generation(ATDG) deals with programs without pointers. Recently, few works hove been done on ATDG in the presence of pointers, but they ore path-oriented techniques which require the specification of on entire program path to be tested or a program to be executed. This paper presents a new technique for generating test data even without specifying a program path completely. The presented technique is a static technique which transforms the test data generation problem into a SAT(SATisfiability) problem and makes advantage of SAT solvers for ATDG. For the ends, we transform a program under test into Alloy which is the first-order relational logic and then produce test data via Alloy analyzer.
Guidelines for Implementing Configuration Management in Extreme Programming based on CMMI
Han, Dong-Joon ; Han, Hyuk-Soo ;
Journal of Internet Computing and Services, volume 9, issue 2, 2008, Pages 107~118
The XP, the representative methodology of Agile software development, maximizes the effectiveness of the development by focusing on development itself and using primitive and basic process definition that can be easily implemented in the fields. However, the most of XP's practices came from those of engineering and the manogement practices of work product tend to be overlooked. The research on the implementation of those manogement practices has not been performed enough. Because of deficiency of processes that guide the change control over major baselines of work product and that describe proper continuous integration and refactoring in XP, the integrity of those work products is difficult to be guaranteed. To fulfill this work product integrity, CM(configuration manogement) should be hired and CMMI(Capability Maturity Model Integration) is considered to be the best references for that purpose, CMMI defines the required practices of CM and leave implementation details to the organization so that it could customize those practices based on the characteristics of its development methods. The CM process implementation guidelines based on CMMI could provides work product integrity with a way of keeping XP's agility that includes continuous integration, refactoring and small release. In this research, we selected CM process factors applicable to XP among CMMI's CM practices and based on them we developed the CM implementation guidelines.
A Study on the Teachers' ICT Training Status and Using Realities
Kim, Jae-Hyoun ; Back, Jin-Hee ;
Journal of Internet Computing and Services, volume 9, issue 2, 2008, Pages 119~129
The business of fortifying teachers' abilities to utilize information is in progress in various ways such as ICT(Information & Communication Technology) training for teachers, the intensification of ICT application, and training teachers who are responsible for information education of school. And teachers' ICT training is being expanded progressively. Therefore, the purposes of this study are to find out the general situation of ICT training for teachers in preparation for the rapidly changing knowledge-information society, and to investigate teachers' recognition about how the training influences on teaching & learning and on the works they are charge in. Also, we analyze the utilization rate of ICT ruining curriculum in relation to activities of teaching and learning and the works teachers' are charge in. On the basis of these, we propose improvement methods for ICT training, thus improve the fundamental quality of education.
Design and Implementation of a Location-Aware Tour Guide System for a Palace
Park, Da-Jung ; Hwang, Sang-Hee ; Kim, Ah-Reum ; Chang, Byeong-Mo ;
Journal of Internet Computing and Services, volume 9, issue 2, 2008, Pages 131~138
The goal of our research is to develop a smart location-based self guided lour assistant as a context-aware real world application. As a context-aware tourist guide application, we hove been developing a PDA-based location-aware tourist guide application for the old palace Deoksugung in the center of Seoul. It will guide visitors to the palace with information about: current location, attractions nearby, and details about specific buildings. Rich multimedia support has been incorporated into the system to provide extra features to enhance the self-guided tour.
A Design of Call Routing Agent for Multi-Channel
Jun, Byung-Uk ;
Journal of Internet Computing and Services, volume 9, issue 2, 2008, Pages 139~145
CRM(Customer Relationship Management) improves the competitiveness of small companies to large enterprises. E-mail, SMS (Short Message Service), telephony service, DM (Direct Mail) are used for customer response in many companies. In order to improve company's profit, business diversification is in progress with protecting the succession of existing customers, and the only of new customers. Futhermore, BPR (Business Process Re-engineering) and BPM (Business Process Management) of the CRM can be easily found in many companies, because it is the first contact point to the company at the customer's view. This paper discusses the development of CRM, and proposes a call object routing agent that is the main engine of the CRM. Result of performance evaluation of proposed method show that the system is effective and powerful enough to use at the multi-channel environment.