Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 9, Issue 6 - Dec 2008
Volume 9, Issue 5 - Oct 2008
Volume 9, Issue 4 - Aug 2008
Volume 9, Issue 3 - Jun 2008
Volume 9, Issue 2 - Apr 2008
Volume 9, Issue 1 - Feb 2008
Selecting the target year
A Modified-PLFS Packet Scheduling Algorithm for Supporting Real-time traffic in IEEE 802.22 WRAN Systems
Lee, Young-Du ; Koo, In-Soo ; Ko, Gwang-Zeen ;
Journal of Internet Computing and Services, volume 9, issue 4, 2008, Pages 1~10
In this paper, a packet scheduling algorithm, called the modified PLFS, is proposed for real-time traffic in IEEE 802.22 WRAN systems. The modified PLFS(Packet Loss Fair Scheduling) algorithm utilizes not only the delay of the Head of Line(HOL) packets in buffer of each user but also the amount of expected loss packets in the next-next frame when a service will not be given in the next frame. The performances of the modified PLFS are compared with those of PLFS and M-LWDF in terms of the average packet loss rate and throughput. The simulation results show that the proposed scheduling algorithm performs much better than the PLFS and M-LWDF algorithms.
Adaptive Minimum Sleep Window Algorithm for Saving Energy Consumption in IEEE 802.16e
Jung, Woo-Jin ; Lee, Tae-Jin ; Chung, Yun-Won ; Chung, Min-Young ;
Journal of Internet Computing and Services, volume 9, issue 4, 2008, Pages 11~20
IEEE 802.16e has adopted sleep mode to minimize energy consumption of mobile nodes with high speed mobility. If the Base Station (BS) has no data to be sent to a Mobile Subscriber Station (MSS) at the instant of ending sleep window of the MSS, the MSS increases its sleep window interval by double until the window interval reaches to the maximum sleep window interval. Thus, during the operation of sleep mode, MSS repeatedly performs switch on/off action until there exist frames to be received from BS. The switch on/off operation significantly consumes energy of MSS. To effectively deal with the energy of the MSS, this paper proposes an algorithm which decides the minimum sleep window interval that will be used in next sleep mode based on the current sleep window interval. We evaluate the performance of IEEE 802.16e sleep mode algorithm and our proposed algorithm in terms of energy consumption and blocking probability. Compared with the current sleep mode algorithm used in IEEE 802.16e, the proposed algorithm decreases the energy consumption by about 30% without increasing blocking probability.
TCP CAE : Improving Wireless TCP under Reverse Background Congestion through Comparative ACK-based Estimator
Kim, Jae-Hyun ; Choo, Hyun-Seung ;
Journal of Internet Computing and Services, volume 9, issue 4, 2008, Pages 21~27
TCP receivers deliver ACK packets to senders for reliable end-to-end transfer. When ACK packets are not transferred properly because of network congestion, the performance of TCP degrades. This paper proposes a reverse congestion warning mechanism and a congestion handling mechanism in heterogeneous networks with heavy background traffic in the backward direction. Help from TCP receivers or hardware such as routers and gateways other than the ACK packets themselves is not necessary. TCP senders compare the arrival intervals of ACK data passed from receivers and the difference in t imestamp values echoed by receivers. According to the simulation results using the NS-2 network simulator, the proposed scheme shows a performance elevation of 20% greater than Reno, 150% greater than New Reno, and 450% greater than Westwood, respectively, under heterogeneous networks and that the error rate of the radio link is 1% when the backward network is congested.
Classification and Analysis of Mobility Patterns in Nested NEMO Network
Lim, Hyung-Jin ; Chung, Tai-Myoung ;
Journal of Internet Computing and Services, volume 9, issue 4, 2008, Pages 29~41
Currently, IETF MANEMO(Mobile Adhoc for NEMO) working group is working on standardization supporting internal routing in nested NEMO networks. Nested NEMO has a independent topology feature that Mobile IP and basic NEMO protocol did not caused. This is the reason that causes exceptional mobility pattern. Such mobility patterns also trigger each other reconfiguration requirements. This paper classified and analyzed probable new mobility patterns in nested NEMO network. In concludion, we derived configuration problem from the new mobility patterns and suggested differential reconfiguration requirements through analytical approach.
An Energy-Efficient Clustering Using Division of Cluster in Wireless Sensor Network
Kim, Jong-Ki ; Kim, Yoeng-Won ;
Journal of Internet Computing and Services, volume 9, issue 4, 2008, Pages 43~50
Various studies are being conducted to achieve efficient routing and reduce energy consumption in wireless sensor networks where energy replacement is difficult. Among routing mechanisms, the clustering technique has been known to be most efficient. The clustering technique consists of the elements of cluster construction and data transmission. The elements that construct a cluster are repeated in regular intervals in order to equalize energy consumption among sensor nodes in the cluster. The algorithms for selecting a cluster head node and arranging cluster member nodes optimized for the cluster head node are complex and requires high energy consumption. Furthermore, energy consumption for the data transmission elements is proportional to
around the crossover region. This paper proposes a means of reducing energy consumption by increasing the efficiency of the cluster construction elements that are regularly repeated in the cluster technique. The proposed approach maintains the number of sensor nodes in a cluster at a constant level by equally partitioning the region where nodes with density considerations will be allocated in cluster construction, and reduces energy consumption by selecting head nodes near the center of the cluster. It was confirmed through simulation experiments that the proposed approach consumes less energy than the LEACH algorithm.
Positioning Algorithm Based on the Information of Range-Data Reliability
Koo, In-Soo ; Xuan, Cong Tran ; Kim, Eun-Chan ; Choi, Sung-Soo ;
Journal of Internet Computing and Services, volume 9, issue 4, 2008, Pages 51~59
In wireless sensor networks, one of most common location detection methods that do not require additional devices such as GPS and ultrasonic sensor, is the location detection method based on received signal strength. However, measured received signal strength will fluctuate over time mainly due to physical radio channel characteristics between nodes, which subsequently will cause errors to measured distance between nodes. Since these contaminated distance data are utilized to detect the location of unknown node, there will be accumulated errors in the location of unknown node. In order to overcome the limitation of the location detection method based on received signal strength, we propose a location scheme in which reliability information of distance data as well as distance data between nodes are utilized to estimate the location of unknown node. Through simulation, it is shown that the proposed scheme can accomplish 30% capacity improvement.
Efficient DBA Algorithm for Supporting CBR Service on EPON with Traffic Burstiness
Lee, Jin-Hee ; Lee, Tae-Jin ; Chung, Min-Young ; Lee, You-Ho ; Choo, Hyun-Seung ;
Journal of Internet Computing and Services, volume 9, issue 4, 2008, Pages 61~68
Ethernet passive optical network (EPON) is the next-generation technology mitigating the bottleneck between high-capacity local area networks (LANs) and a backbone network. The bottleneck is aggrevated depending on burstiness and long range dependence (LRD) of traffic characteristics as well as amount of outgoing traffic from the high-capacity LANs. The proposed scheme decreases average packet delay for data upstreaming by considering such traffic characteristics to dynamically allocate bandwidth to multiple optical network units (ONUs). In addition, it can appropriately support delay-sensitive traffic such as constant bit ratio (CBR) traffic by making maximum cycle time fix regardless of the number of ONUs. The comprehensive simulation results indicate that the proposed scheme acheives up to 77% and 82% lower than previous schemes in terms of average packet delay and average queue size while it limits the maximum cycle time to twice of the basic cycle time.
Secure MAC address-based Authentication on X.509 v3 Certificate in Group Communication
Hong, Sung-Hyuck ;
Journal of Internet Computing and Services, volume 9, issue 4, 2008, Pages 69~77
I propose adding users’Media Access Control (MAC) addresses to standard X.509 certificates to provide more secure authentication. The MAC address can be added by the issuing Certification Authority (CA) to the "extensions" section of the X.509 certificate. I demonstrate that when two users with MAC address information on their digital certificates communicate, the MAC address on the first user’s certificate can be easily verified by the second user. In this way, security can be improved without markedly degrading system performance and the level of initial trust between participants in virtual communities will be improved.
IT Systems Risk Analysis Using Object Oriented Asset Classification Model
Lee, Hyeak-Ro ; Ahn, Seong-Jin ;
Journal of Internet Computing and Services, volume 9, issue 4, 2008, Pages 79~84
In these days, many organizations try to manage their assets in safe way due to fast change in information-communication environment. In Korea, risk analysis and vulnerability analysis for security improvement of critical asset is booming by enforcement of Act on security of information and communication infrastructure. It is obligate that each critical information infrastructure needs to get vulnerability analysis. In this paper, we proposed Object Oriented Asset Classification model for asset analysis and risk analysis.
MAC Address Spoofing Attack Detection and Prevention Mechanism with Access Point based IEEE 802.11 Wireless Network
Jo, Je-Gyeong ; Lee, Hyung-Woo ;
Journal of Internet Computing and Services, volume 9, issue 4, 2008, Pages 85~96
An authentication procedure on wired and wireless network will be done based on the registration and management process storing both the user's IP address and client device's MAC address information. However, existent MAC address registration/administration mechanisms were weak in MAC Spoofing attack as the attacker can change his/her own MAC address to client's MAC address. Therefore, an advanced mechanism should be proposed to protect the MAC address spoofing attack. But, existing techniques sequentially compare a sequence number on packet with previous one to distinguish the alteration and modification of MAC address. However, they are not sufficient to actively detect and protect the wireless MAC spoofing attack. In this paper, both AirSensor and AP are used in wireless network for collecting the MAC address on wireless packets. And then proposed module is used for detecting and protecting MAC spoofing attack in real time based on MAC Address Lookup table. The proposed mechanism provides enhanced detection/protection performance and it also provides a real time correspondence mechanism on wireless MAC spoofing attack with minimum delay.
Supporting WebDAV-based Remote Workspaces for Eclipse IDE
Kim, Seong-Hune ; Lee, Hong-Chang ; Lee, Myung-Joon ;
Journal of Internet Computing and Services, volume 9, issue 4, 2008, Pages 97~114
Eclipse is an open integrated environment for software development, rapidly emerging as the de facto standard for developing java applications. Also, it is easily extensible since new functions for the environment can be added through the installation of various plug-in modules. WebDAV is an IETF standard protocol, which is an extended version of HTTP 1.1, supporting asynchronous collaborative authoring of various contents on the web. In this paper, we describe the development of the DAVSpace plug-in which enables programmers to use remote workspaces offered by WebDAV servers as project workspaces for software development in Eclipse. Based on the WebDAV protocol, DAVSpace supports the management of resources on the remote workspaces associated with projects in Eclipse. Using DAVSpace, we can create a project in Eclipse on a designated remote workspace in addition to the default local workspace. Whenever an event for storing a resource is generated, DAVSpace stores the resource into both workspaces. Thanks to DAVSpace, developers can effectively proceed their projects regardless of where they are located.
Continuous Discovery of Dense Regions in the Database of Moving Objects
Lee, Young-Koo ; Kim, Won-Young ;
Journal of Internet Computing and Services, volume 9, issue 4, 2008, Pages 115~131
Small mobile devices have become commonplace in our everyday life, from cellular phones to PDAs. Discovering dense regions for the mobile devices is one of the problems of grate practical importance. It can be used in monitoring movement of vehicles, concentration of troops, etc. In this paper, we propose a novel algorithm on continuously clustering a large set of mobile objects. We assume that a mobile object reports its position only if it is too far away from the expected position and thus the location data received may be imprecise. To compute the location of each individual object could be costly especially when the number of objects is large. To reduce the complexity of the computation, we want to first cluster objects that are in proximity into a group and treat the members in a group indistinguishable. Each individual object will be examined only when the inaccuracy causes ambiguity in the final results. We conduct extensive experiments on various data sets and analyze the sensitivity and scalability of our algorithms.
An Activity Analysis Method for Workflow Visual Verification and Mining
Kim, Kwang-Hoon ;
Journal of Internet Computing and Services, volume 9, issue 4, 2008, Pages 133~142
This paper conceives and implements an activity analysis method as a tool to be used for workflow visual verification and mining. One of the recent issues in the workflow and business process literature is to refine and to improve the deployed workflows and business processes. The activity analysis method proposed in this paper provides a way to fine a set of activities being directly affected by the specific activity that a user tries to change its properties. I would strongly believe that the method can be a useful solution for the dynamic changes and visual verifications problems of workflow models as well as the workflow process mining problems. Finally, to prove the possibility of the proposed method and its applicability, we apply to a workflow model of the electronic approval system run by a real corporation.
Design and Implementation of Grid-based PACS
Kim, Jung-Su ; Lee, Se-Yul ; Park, Jin-Sub ; Lee, Bong-Hwan ;
Journal of Internet Computing and Services, volume 9, issue 4, 2008, Pages 143~156
Grid-based PACS can provide an advanced medical information services such as remote image file transfer, collaboration, remote diagnosis, and virtual hospital. In this paper, we have implemented Grid-PACS which guarantees both storage safety and extendability for virtual large scale storage system. The experimental results showed that the virtual storage system provided more efficient and faster data transfer than the conventional PACS. The proposed Grid data management system can be utilized to improve the effectiveness of the PACS data management and transmission between medical institutions.
The Development of Effective Database Model for Pipe Network Management Monitoring Program
Kang, Byung-Mo ; Lee, Hyun-Dong ; Hong, In-Sik ;
Journal of Internet Computing and Services, volume 9, issue 4, 2008, Pages 157~166
There has been a renewal of interest in management of underground facility in recent years. As several research have been made on management for underground facility of waterworks pipe. In this paper smart-tag is defined and applied to requiring ubiquitous environment. Also, GPS is essential technology for the implementation of proposed program, which has GPS and RFID mixed business model. And it manages data of underground facility with RFID system effectively and provides the high quality practical effectiveness of entire system through GPS receiving module and network communication on GIS. In conclusion, this paper proposed applications management system with location mixed database. Proposed database and interface skill is tested and evaluated through the simulation.