This paper introduces an interactive contents authoring system which can easily and conveniently produce interactive contents for the terrestrial digital multimedia broadcasting (T-DMB). The introduced authoring system provides powerful graphical user interface and produces interactive broadcasting contents in the forms of binary and textual format
{"title":"The interactive contents authoring system for terrestrial digital multimedia broadcasting","authors":"W. Cheong, J. Cha, YeSun Joung, Kyuheon Kim","doi":"10.1117/12.704786","DOIUrl":"https://doi.org/10.1117/12.704786","url":null,"abstract":"This paper introduces an interactive contents authoring system which can easily and conveniently produce interactive contents for the terrestrial digital multimedia broadcasting (T-DMB). The introduced authoring system provides powerful graphical user interface and produces interactive broadcasting contents in the forms of binary and textual format","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122178667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206239
Moonsoo Kang, Jeonghoon Mo
The demands for reliable large data transfer increases and it becomes more likely to happen soon as the technologies such as optical burst switching (OBS) and high speed TCP mature. In this paper, we consider high speed TCPs over OBS networks. We evaluate variants of high speed TCP over OBS networks; point out a performance problem when these two technologies are combined; propose a transport level solution based on pacing. The effectiveness of the proposed solution is validated through the simulation using the OBS-ns simulator
{"title":"On the Pacing Technique for High Speed TCP Over Optical Burst Switching Networks","authors":"Moonsoo Kang, Jeonghoon Mo","doi":"10.1109/ICACT.2006.206239","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206239","url":null,"abstract":"The demands for reliable large data transfer increases and it becomes more likely to happen soon as the technologies such as optical burst switching (OBS) and high speed TCP mature. In this paper, we consider high speed TCPs over OBS networks. We evaluate variants of high speed TCP over OBS networks; point out a performance problem when these two technologies are combined; propose a transport level solution based on pacing. The effectiveness of the proposed solution is validated through the simulation using the OBS-ns simulator","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116605220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206240
Byungsang Kim, Jihwan Kim, Min-Gon Kim, Minho Kang
Recently, there are many paradigms for supporting convergence for both networks and computing. Grid computing offers high levels of computational, storage and network capacity on the wide area environment. Optic based network is a good candidate for supporting the grid application. In this paper, we proposed a novel contention resolution scheme which is differentiated by specific application and their job type for supporting grid services in the OBS network
{"title":"Application-aware contention resolution scheme for grid services over OBS networks","authors":"Byungsang Kim, Jihwan Kim, Min-Gon Kim, Minho Kang","doi":"10.1109/ICACT.2006.206240","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206240","url":null,"abstract":"Recently, there are many paradigms for supporting convergence for both networks and computing. Grid computing offers high levels of computational, storage and network capacity on the wide area environment. Optic based network is a good candidate for supporting the grid application. In this paper, we proposed a novel contention resolution scheme which is differentiated by specific application and their job type for supporting grid services in the OBS network","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116808445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206129
Joo-Chul Lee, Youn-Hee Han, M. Shin, Heejin Jang, Hyoungjun Kim
IEEE 802.16 issued standards for the new PHY and MAC for providing broadband wireless access network. It is characterized by very high data rates and wider range which are different from existing wireless access technologies such as IEEE 802.11 or 3G. Accordingly, the use of IPv6 over IEEE 802.16 network is currently undefined. There are several issues to be considered in deploying IPv6 over IEEE 802.16 networks. Among them, this document will describe issues related to NDP (neighbor discovery protocol) over IEEE 802.16 networks
{"title":"Considerations of Neighbor Discovery Protocol over IEEE 802.16 Networks","authors":"Joo-Chul Lee, Youn-Hee Han, M. Shin, Heejin Jang, Hyoungjun Kim","doi":"10.1109/ICACT.2006.206129","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206129","url":null,"abstract":"IEEE 802.16 issued standards for the new PHY and MAC for providing broadband wireless access network. It is characterized by very high data rates and wider range which are different from existing wireless access technologies such as IEEE 802.11 or 3G. Accordingly, the use of IPv6 over IEEE 802.16 network is currently undefined. There are several issues to be considered in deploying IPv6 over IEEE 802.16 networks. Among them, this document will describe issues related to NDP (neighbor discovery protocol) over IEEE 802.16 networks","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128511975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206282
H. Tsunoda, Y. Nemoto, K. Ohta, A. Yamamoto
In this paper, we propose a simple but tough method for confirming response packets to detect DRDoS attack packets. In DRDoS attacks, the victim suffers from reflected response packets from legitimate hosts, and it is difficult to distinguish attack packets from legitimate packets. We focus on the fact that the types of packet used for DRDoS are limited and predictable. Thus, the proposed method uses only a pair of request/response, and does not need complicated state management like the stateful inspection method. We demonstrate that the proposed method can accurately detect DRDoS packets with fewer cost
{"title":"A simple response packet confirmation method for DRDoS detection","authors":"H. Tsunoda, Y. Nemoto, K. Ohta, A. Yamamoto","doi":"10.1109/ICACT.2006.206282","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206282","url":null,"abstract":"In this paper, we propose a simple but tough method for confirming response packets to detect DRDoS attack packets. In DRDoS attacks, the victim suffers from reflected response packets from legitimate hosts, and it is difficult to distinguish attack packets from legitimate packets. We focus on the fact that the types of packet used for DRDoS are limited and predictable. Thus, the proposed method uses only a pair of request/response, and does not need complicated state management like the stateful inspection method. We demonstrate that the proposed method can accurately detect DRDoS packets with fewer cost","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128684284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1093/ietcom/e91-b.4.987
Y. Chan, Chia-Liang Lin, Cheng-Yuan Ho
A critical design issue of TCP is its congestion control that allows the protocol to adjust the end-to-end communication rate to the bandwidth on the bottleneck link. However, TCP congestion control may function poorly in high bandwidth-delay product networks because of its slow response with large congestion windows. In this paper, we propose an improved version of TCP Vegas called quick Vegas, in which we present an efficient congestion window control algorithm for a TCP source. Our algorithm is based on the increment history and estimated amount of extra data to update the congestion window intelligently. Simulation results show that quick Vegas significantly improve the performance of connections as well as remain fair and stable when the bandwidth-delay product increases
{"title":"Improving performance of TCP Vegas for high bandwidth-delay product networks","authors":"Y. Chan, Chia-Liang Lin, Cheng-Yuan Ho","doi":"10.1093/ietcom/e91-b.4.987","DOIUrl":"https://doi.org/10.1093/ietcom/e91-b.4.987","url":null,"abstract":"A critical design issue of TCP is its congestion control that allows the protocol to adjust the end-to-end communication rate to the bandwidth on the bottleneck link. However, TCP congestion control may function poorly in high bandwidth-delay product networks because of its slow response with large congestion windows. In this paper, we propose an improved version of TCP Vegas called quick Vegas, in which we present an efficient congestion window control algorithm for a TCP source. Our algorithm is based on the increment history and estimated amount of extra data to update the congestion window intelligently. Simulation results show that quick Vegas significantly improve the performance of connections as well as remain fair and stable when the bandwidth-delay product increases","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124570855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206188
S.D. Mansoori, H. K. Bizaki
Linear attack, at the first, introduced for DES encryption system, by Matsui. That cryptanalysis was based on linear approximation of nonlinear S-boxes of algorithm. Then this kind of attack deployed for other kinds of block ciphers. This paper describes linear attack on second round SAES. By using this cryptanalysis, it is possible to attack on full round of SAES algorithm. Undoubtly, one of important results of this cryptanalysis is that, it is possible to better understanding linear attack on Rijndael
{"title":"Linear cryptanalysis on second round simplified AES","authors":"S.D. Mansoori, H. K. Bizaki","doi":"10.1109/ICACT.2006.206188","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206188","url":null,"abstract":"Linear attack, at the first, introduced for DES encryption system, by Matsui. That cryptanalysis was based on linear approximation of nonlinear S-boxes of algorithm. Then this kind of attack deployed for other kinds of block ciphers. This paper describes linear attack on second round SAES. By using this cryptanalysis, it is possible to attack on full round of SAES algorithm. Undoubtly, one of important results of this cryptanalysis is that, it is possible to better understanding linear attack on Rijndael","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129423510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206102
K. Choi, Jin-Ho Jo, C. Sin, S. Lee
The on-board switching (OBS) satellite system technology have started domestic development to overcome the limitation of the frequency resource and geostationary orbit existing relay type satellite transponder and the required performance of a spot beam, and looked around the configuration and functions of the multi-beam switching satellite communication system. The monitor and control function of the network control system (NCS) maximizes the operation of the OBS satellite transponder, optimizes the status of the satellite system and satellite communication network by monitoring and controlling predefined satellite parameters of the service network using communications satellite transponder. This paper proposes the requirements of the network control functions from ground control station and then presents a design draft of the system in order to maximize the system availability
{"title":"Design of the Network Control System for OBS Satellite Communications System","authors":"K. Choi, Jin-Ho Jo, C. Sin, S. Lee","doi":"10.1109/ICACT.2006.206102","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206102","url":null,"abstract":"The on-board switching (OBS) satellite system technology have started domestic development to overcome the limitation of the frequency resource and geostationary orbit existing relay type satellite transponder and the required performance of a spot beam, and looked around the configuration and functions of the multi-beam switching satellite communication system. The monitor and control function of the network control system (NCS) maximizes the operation of the OBS satellite transponder, optimizes the status of the satellite system and satellite communication network by monitoring and controlling predefined satellite parameters of the service network using communications satellite transponder. This paper proposes the requirements of the network control functions from ground control station and then presents a design draft of the system in order to maximize the system availability","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129462393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206161
Xu Huang, D. Sharma
Mobile and wireless communications are rapidly developing, "what lies ahead for cellular technology?" published by George Lawton (G. Lawton, June 2005) shows this concern. Binary receiver in wireless fading channels is one of important issues in the digital wireless communications. The error probability of binary in Nakagami-m fading channels was investigated in this paper. In particularly, the application for optimum binary receiver was carefully presented for the so called optimum threshold for an error probability. At the same time, the related Nakagami-m parameter fading channels were also estimated by closed forms, which can be applied to the based estimation for the digital communication systems with various noises. As one application, the error probability was used to estimate the bottom line of binary communication systems. Other digital coding systems are discussed in separated papers
{"title":"Analysis of the error probability of a binary receiver in wireless fading channels","authors":"Xu Huang, D. Sharma","doi":"10.1109/ICACT.2006.206161","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206161","url":null,"abstract":"Mobile and wireless communications are rapidly developing, \"what lies ahead for cellular technology?\" published by George Lawton (G. Lawton, June 2005) shows this concern. Binary receiver in wireless fading channels is one of important issues in the digital wireless communications. The error probability of binary in Nakagami-m fading channels was investigated in this paper. In particularly, the application for optimum binary receiver was carefully presented for the so called optimum threshold for an error probability. At the same time, the related Nakagami-m parameter fading channels were also estimated by closed forms, which can be applied to the based estimation for the digital communication systems with various noises. As one application, the error probability was used to estimate the bottom line of binary communication systems. Other digital coding systems are discussed in separated papers","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126702576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206281
Ki Hyun Kim, Jang-Hee Yoo, K. Chung
This paper proposes a VPN accelerator board (VPN-AB), a virtual private network (VPN) protocol designed for trust channel security system (TCSS). The TCSS supports safety communication channel between security nodes in Internet. It furnishes authentication, confidentiality, integrity, and access control to the security node to transmit data packets with IPsec protocol. TCSS consists of Internet key exchange block, and security association block, IPsec engine block. The Internet key exchange block negotiates crypto algorithm and key used in IPsec engine block. Security association blocks setting-up and manages security association information. IPsec engine block treats IPsec packets and consists of networking functions for communication. The IPsec engine block should be embodied by HAV and in-line mode transaction for high speed IPsec processing. Our VPN-AB is implemented with high speed security processor that supports many cryptographic algorithms and in-line mode. We evaluate a small TCSS communication environment, and measure a performance of VPN-AB in the environment. The experiment results show that VPN-AB gets a performance throughput of maximum 15.645 Gbps when we set the IPsec protocol with 3DES-HMAC-MD5 tunnel mode
{"title":"Implementation of 10 Giga VPN accelerator board","authors":"Ki Hyun Kim, Jang-Hee Yoo, K. Chung","doi":"10.1109/ICACT.2006.206281","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206281","url":null,"abstract":"This paper proposes a VPN accelerator board (VPN-AB), a virtual private network (VPN) protocol designed for trust channel security system (TCSS). The TCSS supports safety communication channel between security nodes in Internet. It furnishes authentication, confidentiality, integrity, and access control to the security node to transmit data packets with IPsec protocol. TCSS consists of Internet key exchange block, and security association block, IPsec engine block. The Internet key exchange block negotiates crypto algorithm and key used in IPsec engine block. Security association blocks setting-up and manages security association information. IPsec engine block treats IPsec packets and consists of networking functions for communication. The IPsec engine block should be embodied by HAV and in-line mode transaction for high speed IPsec processing. Our VPN-AB is implemented with high speed security processor that supports many cryptographic algorithms and in-line mode. We evaluate a small TCSS communication environment, and measure a performance of VPN-AB in the environment. The experiment results show that VPN-AB gets a performance throughput of maximum 15.645 Gbps when we set the IPsec protocol with 3DES-HMAC-MD5 tunnel mode","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130635667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}