Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of The Institute of Internet, Broadcasting and Communication
Journal Basic Information
Journal DOI :
The institute Of Webcasting, Internet And Telecommunication
Editor in Chief :
Volume & Issues
Volume 11, Issue 6 - Dec 2011
Volume 11, Issue 5 - Oct 2011
Volume 11, Issue 4 - Aug 2011
Volume 11, Issue 3 - Jun 2011
Volume 11, Issue 2 - Apr 2011
Volume 11, Issue 1 - Feb 2011
Selecting the target year
Design of Wireless HD Image Transmission System with Bidirectional CEC Function
Kim, Won ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 11, issue 5, 2011, Pages 1~9
Nowadays it is necessary to replace electrical wires with another intelligent connection method because the consumers, who have much experience with mobile smart devices, are expecting easier and smarter connectivity in their home electronics such as wireless linking. In this paper a bidirectional CEC control scheme is newly proposed to expand the controllability from one to two way in a millimeter band image transmission system because two degree of freedom controllability presents more intelligent convenience in HDMI interface systems. Experimental study shows the feasibility of the proposed system as an advanced image transmission solution in millimeter band including an intelligent 2 DOF CEC interface with the performance result of 3.0 Gbps transmission band for 1080p full-HD image steaming.
ER_Modeler: A Logical Database Design Tool based on Entity-Relationship Model
Jung, In-Hwan ; Kim, Young-Ung ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 11, issue 5, 2011, Pages 11~17
In this paper, we propose ER_Modeler, which is a logical database design tool based on entity-relationship model. ER_Modeler provides the entity-relationship diagrams to be built graphically on windows and generates the graphs into the appropriate data definition language for creating relational database tables. Furthermore, ER_Modeler provides the import/export functions using XML to guarantee the interoperability with ERwin which is one of the most popular commercial products.
Implementation of a Ad-Hoc based LED-IT-Sensor Integrated Streetlight with Selective Remote Control
Oh, Sun-Jin ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 11, issue 5, 2011, Pages 19~25
With the issue of a Green IT Technology, studies on a environment-friendly luminous source that can reduce Carbon discharge and increase energy efficiency are actively progressed all over the world. Especially, with the problems of high oil price and environmental pollution, LED has made a great attention as a new luminous source that can replace the existing incandescent bulbs and fluorescent lights. In this paper, the proposed streetlight system becomes more intellectual by combining the low power consuming, high efficient, and high luminous LED module with a complex sensor module with temperature, humidity, illumination and motion sensors. Then, we design and implement the Ad-Hoc based LED-IT-Sensor integrated streetlight system that can maximize the energy savings efficiently with central monitoring system and selective remote dimming control by connecting them to the wireless ubiquitous sensor network(USN) using a Zigbee module.
Performance Improvement of MCMA Equalizer with Parallel Structure
Yoon, Jae-Sun ; Lim, Seung-Gag ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 11, issue 5, 2011, Pages 27~33
In digital communication system that the Modified Constant Modulus Algorithm (MCMA) reduced the use of the adaptive equalization algorithm to combat the Inter-symbol Interference (ISI). MCMA is relatively brief operation. The major point of MCMA that it only achieves moderate convergence rate and steady state mean square error (MSE). In this paper suggest, MCMA equalization improve the performance with parallel structure. It combines Modified Constant Modulus Algorithm(MCMA) and Modified Decision Directed(MDD) algorithm. By exploiting the inherent structural relationship between the 4-QAM signal's coordinates and 16-QAM signal's coordinates, another style of cost function for Modified Constant Modulus Algorithm(MCMA) is defined and If it happen to offset of received signals and MCMA is poor performance in order to overcome this because the paper combines apply for MCMA and MDD(Modified Decision Direct) algorithm. By computer simulation, we confirmed that the proposed PMCMA-MDD algorithm has the fater convergence rate and steady mean square error than the conventional MCMA.
A Study on Mobile Robot Auto Recharging System Based on Wireless Power Transmission and Visual Information
Kim, Jae-Oh ; Lee, Kyung-Jung ; Ahn, Hyun-Sik ; Moon, Chan-Woo ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 11, issue 5, 2011, Pages 35~40
In this paper, an auto recharging system for a mobile robot based on the wireless power transmission and visual information is proposed. The existing recharging systems for mobile robot use mechanical contact while wireless power transmission transfers energy by electromagnetic induction method without contacts. For efficiency of charging, alignment of coils is important. In order to solve this problem, with the visual image, ellipticity of coil circle is recognized to control the pose of mobile robot.
Evaluation on Routing Protocols over MANETs with Fading Channel
Afzal, Muhammad Khalil ; Kim, Byung-Seo ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 11, issue 5, 2011, Pages 41~46
Mobile Ad-Hoc networks (MANET) has been getting the spotlight in the area of the wireless networks because of its flexibility and salability, and developing of many applications with it. As a consequence, MANETs are required to process not only simple data traffics, but also multimedia traffics, which has some constraints on the performances. However, unlike wired-networks, the wireless networks have frequent route-disconnections due to some reasons such as channel errors and mobility. Such frequent link disconnections makes the delivery of multimedia traffics difficult. Even though there many researches on multimedia transmissions on various environments, the performances of multimedia transmissions over fading channel and mobility even using various routing protocols have not been evaluated. Therefore, this paper extensively simulates the MPEG-4 video transmission over fading channel environment with node's mobility. In addition, the performances with two routing protocols such as AODV and DSR are compared. Finally, the simulation results shows that DSR protocol has the better performances to deliver MPEG-4 traffic.
On the Study of the Period Measurement of Ultrasonic Signal in Damaged Vehicle Tire
Park, Jung-Im ; Lim, Seung-Gak ; Kang, Dae-Soo ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 11, issue 5, 2011, Pages 47~52
We studied about the damaged tire decision algorithm that measured dominant period of ultrasonic signal due to a foreign material on the friction between tire and road surface. We computed the power spectrum about the envelope of ultrasonic signal acquired from the damaged tire, then proposed the dominant period decision algorithm by statistical power threshold value. As the result of simulation, when driving by the speed of 80km/h, the 100ms of dominant period that measured in the proposed algorithm is more accurate than the 97.6ms of power spectrum peak period referenced on the average period of ultrasonic signal envelope peak, 101.24ms.
Cooperative Transmission Protocol based on Opportunistic Incremental Relay Selection over Rayleigh fading channels
Xuyen, Tran Thi ; Kong, Hyung-Yun ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 11, issue 5, 2011, Pages 53~58
In this paper, we firstly propose a novel cooperative transmission protocol, which utilizes the advantages of mid-notes in the route from the source to the destination. Taking benefits from balancing between the received packet from the source and acknowledge message from the destination, the mid-node between the source and the destination is firstly considered to be the broadcaster. If its signal is successfully received from the source, it leads to consider the next nodes, which has closer distance to the destination than it. If one of these nodes correctly receives the signal, it performs broadcasting the signal to the destination instead of mid-node. Otherwise, the mid-node directs attention to these nodes being near to the destination. As the result, some nodes are unnecessary to be considered and passed over time. After that, we analyze some published selection relaying schemes based on geographic information to choose the best nodes instead of the instantaneous SNR as before. Finally, simulation results are given to demonstrate the correctness of the performance analyses and show the significant improvement of the selection relaying schemes based geographic information compared to the other ones.
A Lattice Transversal Joint Adaptive Filter with Fixed Reflection Coefficients
Yoo, Jae-Ha ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 11, issue 5, 2011, Pages 59~63
We present a lattice transversal joint (LTJ) adaptive filter with fixed reflection coefficients to achieve fast convergence with low complexity. The reflection coefficients of the filter are given by the statistics of speech signals, and the proposed order of the lattice predictor is one. Experimental results confirm that as compared to the adaptive transversal filter, the proposed adaptive filter achieves fast convergence with a negligible increase in complexity. The proposed adaptive filter converges around six times faster than the adaptive transversal filter in case of the band-limited voiced signal from the ITU-T G.168 standard.
Interactive Face Warping Software for Smartphone
Kim, Nam-Yun ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 11, issue 5, 2011, Pages 65~71
Face warping techniques have been used for correcting image distortion as well as for creative purposes(e.g., morphing). Smartphone can capture an image from camera and transfer it through network. Thus, warping software which is implemented on the smartphone may be widely used in the fields of game and plastic surgery. This paper describes the design of face warping software using transformation with multiple pairs of lines and bilinear interpolation, and then shows the implementation results on the smartphone. Through many people review, this software showed real-time responsiveness and good transformation quality.
Smart Message Service Platform for Mobile Environment
Kim, Nam-Yun ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 11, issue 5, 2011, Pages 73~79
With increasing use of smartphone, users require a new message service to prevent security attack and provide integrated messages. Since smartphone uses data services such as 3G cell network and WiFi, it can provide reliable message transfer through various security policies. In addition, it can transfer various data collected using built-in camera and GPS. This paper proposes a smart message service platform which can provide security services such as authentication, confidentiality and integrity as well as transfer the integrated message including location, picture and text. To verity the functionality of the platform, this paper implements an iPhone app and message transfer server, and then shows the implementation results.
A Study on Fractal Antenna Design and Fabrication for Multi-Band Applications
Kim, Kab-Ki ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 11, issue 5, 2011, Pages 81~86
In this paper, fractal microstrip patch antenna in a semicircle, by designing a multi-resonant antenna was improved by bandwidth issues, including the IEEE 802.11 wireless LAN and IEEE802.16e-band mobile WiMax specification both of which can contain non-directional antenna design and measured characteristics of the antenna for multi-resonant resonant frequency, impedance matching, radiation pattern, brilliantly polarity and multiple independent frequencies that can be controlled to meet the three semicircular wireless communications by inserting fractal patch antenna was designed.
Design of a Bounded-wave EMP Simulator Antenna
Sun, Da-Young ; Choi, Hak-Keun ; Lim, Seong-Bin ; Jang, Jae-Woong ; Kim, Tae-Yoon ; Choi, Geun-Kyung ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 11, issue 5, 2011, Pages 87~93
A threat of the EMP(Electromagnetic Pulse) is recently increasing, so the development of electromagnetic security technology against the EMP is needed. However, the state of the domestic electromagnetic security technology against the EMP is lower level than the foreign. In this paper, the bounded-wave EMP simulator antenna for the development of electromagnetic security technology against a threat of the EMP is designed. The structure of the designed antenna is from a sort of the basic form of the bounded-wave EMP simulator such as a parallel-plate simulator for testing EMP immunity performance within the EUT(Equipment Under Test). The design processes of the designed simulator is including wave launcher, transmission line and termination taper. In the working volume of the designed antenna, the test object within 30 cm is forming predominant TEM field, so it is confirmed that the designed EMP simulator antenna can be used as the EMP simulator.
Development of the Integrated Multimedia IP-PBX System
Kim, Sam-Taek ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 11, issue 5, 2011, Pages 95~100
The next generation IP-PBX system are demanding multimedia facility to carry out UC(Unified Communication) and voice security also. Therefore, in this paper, we have developed the integrated solution of IP-PBX for the voice security by adopting VPN IPsec based on SIP using tunnel method in transmitting voice data to prevent eavesdrop of voice data and have shared between communication system based on PC and PSTN terminals. In particular, We have developed a video conference, private switching, distributed processing and measured telephone conversation quality. This IP-PBX that is connected Soft-phone provide various optional services.
Research for Modeling Method of DES Using Petri Nets
Kim, Sam-Taek ; Lee, Eun-Joo ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 11, issue 5, 2011, Pages 101~106
In this paper, our goal is to design the controller which operates a manufacturing system, discrete event system, guaranteeing user specification. In specially, based on supervisory control theory W. M. Wonham, our work consists in performing the controller using Petri nets possible parallelism. In addition, we consider the problem of allocation for resources sharing of the issues to consider when designing using Petri net. The controller can be generated by synthesis of user specification model and plant model after giving the management for the resource sharing. This created controller can control the deadlock and starvation which can occur in the case with resource sharing. Previous studies proposed the Constrained Synchronous Reachability graph to synthesis of the two Petri nets models. Therefore, we provide the controlled system which forbids a deadlock and starvation using the result of previous studies.
Implementation of a Portable Identification System using Iris Recognition Techniques
Joo, Sang-Hyun ; Yang, Woo-Suk ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 11, issue 5, 2011, Pages 107~112
In this paper, we introduce the implementation of the security system using iris recognition. This system acquires images with infrared camera and extracts the 2D code from a infrared image which uses scale-space filtering and concavity. We examine the system by (i) extract 2D code and (ii) compare the code that stored on the server (iii) measure FAR and FRR using pattern matching. Experiment results show that the proposed method is very suitable.
Open Markets and FDS(Fraud Detection System)
Yoo, Soon-Duck ; Kim, Jung-Ihl ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 11, issue 5, 2011, Pages 113~130
Due to the development of information and communication technology, the global influence on politics, economics, society, and culture has grown. A major example of this impact on the economic sector is the growth of e-commerce, which increases both the speed and efficiency of businesses. In light of these new developments, businesses need to shift away from the misconception that information overwhelms to embrace the enhanced competitiveness that e-commerce provides. However, concern about fraudulent transactions through e-commerce is pertinent because of the loss in both critical revenue and consumer confidence in open markets. Current solutions for fraudulent transactions include real-time monitoring and processing, payment pending, and confirmation through SMS, E-mail, and other wired means. Our research focuses on the management of Fraud Detection Systems (FDS) to safeguard online electronic payment systems. With effective implementation of our research we hope to foster an honorable online trading culture and protect consumers. Future comparative research in domestic and abroad markets would provide further insight into preventing fraudulent transactions.
Security Improvement of Remote User Authentication Scheme based on Smart Cards
Joo, Young-Do ; An, Young-Hwa ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 11, issue 5, 2011, Pages 131~137
Recently Lin et al. proposed a simple remote user authentication scheme using smart cards. But the proposed scheme has not satisfied security requirements which should be considered in the user authentication scheme using the password based smart card. In this paper, we show that Lin et al.'s scheme is insecure against off-line password guessing attack. In their scheme, any legal user's password may be derived from the password guessing when his/her smart card is stolen and the secret information is leaked from the smart card by an attacker. Accordingly, we demonstrate the vulnerability of their scheme and present an enhancement to resolve such security weakness. Our proposed scheme can withstand various possible attacks including password guessing attack. Furthermore, this improved scheme can provide mutual authentication to improve the security robustness. Performance evaluation shows that the proposed scheme is relatively more effective than Lin et al.'s scheme.
A Study of Criterion for Efficient Clustering Estimation of Temporal Data
Jeon, Jin-Ho ; Kim, Min-Soo ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 11, issue 5, 2011, Pages 139~144
Most real world system such as world economy, management, medical and engineering applications contain a series of complex phenomena. One of common methods to understand these system is to build a model and analyze the behavior of the system. As a first step, Determining the best clusters on data. As a second step, Determining the model of the cluster. In this paper, we investigated heuristic search methods for efficient clustering. It is also confirmed that the Bayesian Information Criterion more reliable than Cheeseman-Stutz ones.
Analysis of Posture Balance System of using Multi-parameter after Exercising
Kim, Jeong-Lae ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 11, issue 5, 2011, Pages 145~150
This study was developed the posture balance system of multi-parameter for moving body after and before exercising. Body transition meaned a head moving and upper body moving. This system has catched a signal for physical condition of body data such as a data acquisition system, data signal processing and feedback system. There were checked a parameter that measured vision, vestibular, somatosensory, CNS. This system was evaluated a data through the stability. The posture balance system can be used to support assessment for body moving in exercising situation. It was expected to monitor a physical parameter for health management system.
A Study on the Analysis of Posture Balance Based on Multi-parameter in Time Variation
Kim, Jeong-Lae ; Lee, Kyoung-Joung ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 11, issue 5, 2011, Pages 151~157
This study analyzed the posture balance of time variation for exercising body a period of time. Posture balance measured output values for the posture balance system of body moving in the multi-parameter. Posture moving variation had three methods such as open and closed eye, head moving and upper body moving. There were checked a parameter that measured vision, vestibular, somatosensory, CNS. This system was evaluated a data through the stability. This system has catched a signal for physical condition of body data such as a data acquisition system, data signal processing and feedback system. The output signal was generated Fourier analysis that using frequency of 0.1Hz, 0.1-0.5Hz, 0.5-1Hz and 1Hz over. The posture balance system will be used to support assessment for body moving the posture balance of time variation. It was expected to monitor a physical parameter for health verification system.
A Minimum Spanning Tree Algorithm for Directed Graph
Choi, Myeong-Bok ; Lee, Sang-Un ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 11, issue 5, 2011, Pages 159~171
This paper suggests an algorithm that obtains the Minimum Spanning Tree for directed graph (DMST). The existing Chu-Liu/Edmonds DMST algorithm has chances of the algorithm not being able to find DMST or of the sum of ST not being the least. The suggested algorithm is made in such a way that it always finds DMST, rectifying the disadvantage of Chu-Liu/Edmonds DMST algorithm. Firstly, it chooses the Minimum-Weight Arc (MWA) from all the nodes including a root node, and gets rid of the nodes in which cycle occurs after sorting them in an ascending order. In this process, Minimum Spanning Forest (MST) is obtained. If there is only one MSF, DMST is obtained. And if there are more than 2 MSFs, to determine MWA among all MST nodes, it chooses a method of directly calculating the sum of all the weights, and hence simplifies the emendation process for solving a cycle problem of Chu-Liu/Edmonds DMST algorithm. The suggested Sulee DMST algorithm can always obtain DMST that minimizes the weight of the arcs no matter if the root node is set or not, and it is also capable to find the root node of a graph with minimized weight.
Analysis on Co-use Performance of System according to Transmission Probability
Cho, Ju-Phil ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 11, issue 5, 2011, Pages 173~178
In this paper, we analyze the total performance according to transmit probability of interfering transmitter in hetero systems. We analyze this criteria as a parameter for co-use when hetero systems share the same frequency channels. In order to make an analysis of relationship between transmit probability and performances of two systems. We take into consideration on the case that WLAN is a victim receiver and WiBro is an interfering transmitter. Analyzed coexistence results may be widely applied into the technique developed to get the coexisting condition for wireless devices using many communication protocols in same frequency.
Analysis on Performance for Network Sharing in Adjacent Channels
Cho, Ju-Phil ; Lee, Ock-Goo ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 11, issue 5, 2011, Pages 179~184
In this paper, we analyze the sharing parameters in order to co-use of different communication systems in adjacent channels. We analyze the performance result according to various density of interfering transmitter and transmitter output in hetero systems. In order to get the relationship with between density of interfering transmitter and transmitter output, we consider the case that WiBro is an interfering transmitter an WLAN is a victim receiver. When the center frequency of WLAN is 687MHz and interferer density is 50/
, required guard band is 10MHz. Analyzed coexistence results may be widely applied into the technique developed to get the coexisting condition for wireless devices using many communication protocols in same frequency.
Iterative Coding for High Speed Power Line Communication Systems
Kim, Yo-Cheol ; Cho, Bong-Youl ; Lee, Jae-Jo ; Kim, Jin-Young ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 11, issue 5, 2011, Pages 185~192
In this paper, we simulate and analyze performance of iterative coding scheme, double binary turbo code, for high speed power line communication (PLC) systems. PLC system has hostile environment for high speed data transmission, so error correction method is necessary to compensate effects of PLC channel. We employ the PLC model proposed by M. Zimmerman and Middleton Class A interference model, and system performance is evaluated in terms of bit error rate (BER). From the simulation results, we confirm double binary turbo code provides considerable coding gains to PLC system and BER performance is significantly improved as the number of iteration increase. It is also confirmed that BER performance increases as code rate is lager, while it decreases as the code rate is smaller.
Interactive Social U-Learning Community Design
Kim, Hye-Jin ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 11, issue 5, 2011, Pages 193~201
This paper presents the holistic notion and model of an open social u-learning community, anchored with open content, providing an interactive online study group experience akin to sitting with study buddies on a world-wide campus quad. The interactive social u-learning community design helps conceptualize and maximize advantages of ubiquitous environment in learning. The model is enabled by state-of-the-art web technologies; real-time collaboration technologies for a highly interactive experience; intelligent recommender systems to help learners connect with relevant content and other learners; and mining and analytics to assess learner outcomes. Hence, u-learning design is highly scalable yet interactive and engaging.
Implementation of Personalized Mobile Agent System using Agilla in Ubiquitous Sensor Network
Kim, Gang-Seok ; Lee, Dong-Cheol ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 11, issue 5, 2011, Pages 203~210
The current sensor network analyzes the data collected by the sensing of fixed sensor nodes and provides a service. However, this method cannot actively handle the state and the change in the position of people, 'the target for sensing and the change in the environment', including home automation, building automation and real-time road & weather information, and healthcare environment, etc. To support a dynamic situation which is appropriate for an individual in this diverse environment, it is necessary to provide actively differentiated specific information according to the movement of people and the changes in the environment. In this study, a individualized sensor mobile agent middleware which provides the individualized information (the location of fire incidence and the trace for the path of spread), has been realized through the sensor network environment constructed by the installation of wireless sensor nodes mounted with mobile agent middlewares in buildings.
A P2P-based Management Method for Dynamic AOI
Lim, Chae-Gyun ; Rho, Kyung-Taeg ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 11, issue 5, 2011, Pages 211~216
Networked virtual environments (NVEs) are distributed systems where geographically dispersed users interact with each other in virtual worlds by exchanging network messages. Massively Multiplayer Online Game (MMOG) is one of diverse applications where more than hundreds of users enjoy experiencing virtual worlds. A limited area called area of interest (AOI) in MMOG is reduced the load caused by message exchange between users. Voronoi-based Overlay Network (VON) is proposed to reduce the bandwidth consumption in P2P environments and Vorocast also is made using message forwarding in VON. We propose a dynamic AOI management method that solves problems such as a consistency and latency due to forwarding position updates to neighbor nodes from the message originator in forwarding scheme. Our scheme provides the consistency and reduces latency by combining direct connection scheme and Vorocast scheme compared to existing schemes. The communication between a user and users existing in center circle within AOI of the user is directly connected and the communication between the user and users existing outside the center area within AOI is using Vorocast scheme. The proposed model is evaluated through simulations.
Architecture and Server Selection for DHT-based Distributed CDN
Jung, Jong-Hae ; Oh, Gun-Young ; Lee, Nam-Kyung ; Yoon, Chang-Woo ; Lee, Hyun-Woo ; Ryu, Won ; Lee, Sung-Chang ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 11, issue 5, 2011, Pages 217~228
In centralize CDN systems, the content server selection is performed by service node for every user request, and the selected node is notified to the user. In this paper, we present distributed CDN architecture and algorithm in which the request from a user is delivered to the content source by a P2P algorithm utilizing DHT(distributed hash table) through the overlay network and the user selects one of the source nodes based on real-time user-centric criteria. For this purpose, we propose a modified Pastry algorithm for contents registration, search and selection, in addition to the distributed architecture. The proposed architecture has the advantages of load balancing, traffic balancing, scalability, fault-tolerance due to the self-configuration, self-healing attributes of distributed architecture. Various simulation shows the feasibility of the proposed architecture and algorithm, and the performance is compared and discussed for the variations of the proposed scheme.