Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206038
Kyoung Seok Lee, B. Ryu, Cheol-Hoon Lee
The traffic state control scheme is a radio resource management (RRM) technique which optimizes the use of radio resources and reduces the mobile's power consumption. In this paper, we propose an efficient traffic state control scheme which is based on the three-state model. It exploits utilization of limited radio resources by dynamically switching mobile states. We evaluate the performance of traffic state control schemes on a packet based wireless OFDMA system. The simulation result shows that proposed scheme provides efficient resource allocation in overloaded system
{"title":"A dynamic state management algorithm for overloaded systems","authors":"Kyoung Seok Lee, B. Ryu, Cheol-Hoon Lee","doi":"10.1109/ICACT.2006.206038","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206038","url":null,"abstract":"The traffic state control scheme is a radio resource management (RRM) technique which optimizes the use of radio resources and reduces the mobile's power consumption. In this paper, we propose an efficient traffic state control scheme which is based on the three-state model. It exploits utilization of limited radio resources by dynamically switching mobile states. We evaluate the performance of traffic state control schemes on a packet based wireless OFDMA system. The simulation result shows that proposed scheme provides efficient resource allocation in overloaded system","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116914988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.205986
S. Misra, S. Misra, I. Woungang
We present a conceptual framework for modeling GMPLS-based networks and the solutions to their associated problems. The framework is targeted towards a larger scale initiative by us for designing a Unified Modeling Language (UML) Profile that can help with conceptual modeling of typical GMPLS network design problems. While there are pieces of literature available that describe profiles for other application areas, there are no profiles for use in networking problems, in general. Our work is an important step forward to address this deficiency
{"title":"The Unified Modeling Language-Based Modeling of GMPLS Networks","authors":"S. Misra, S. Misra, I. Woungang","doi":"10.1109/ICACT.2006.205986","DOIUrl":"https://doi.org/10.1109/ICACT.2006.205986","url":null,"abstract":"We present a conceptual framework for modeling GMPLS-based networks and the solutions to their associated problems. The framework is targeted towards a larger scale initiative by us for designing a Unified Modeling Language (UML) Profile that can help with conceptual modeling of typical GMPLS network design problems. While there are pieces of literature available that describe profiles for other application areas, there are no profiles for use in networking problems, in general. Our work is an important step forward to address this deficiency","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117189481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206058
Sang-Kil Park, J. Oh, Jongsoo Jang
Recently, enterprises, service provider, and e-businesses confront increasing security and performance challenges. Securing network, host, and on-line application is absolutely important. At the same time, security function must not disturb productivity. To ensure that increasing network traffic is safe and their networks are secure, these organizations must provide security with bias toward solutions that accommodate performance demands, while providing the security and networking features required to run their businesses. That is, best solutions are those that combine high performance with topnotch security. For satisfying those requirements, we have developed hardware based and high performance security gateway system (SGS) which providing security functions such firewall, IDS, rate-limiting, and traffic metering in wire speed. In this paper, we especially describe how H/W based firewall and rate-limiting and their response coordinating engine features are implemented in SGS as a hardware chipset (FPGA)
{"title":"High-speed attack mitigation engine by packet filtering and rate-limiting using FPGA","authors":"Sang-Kil Park, J. Oh, Jongsoo Jang","doi":"10.1109/ICACT.2006.206058","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206058","url":null,"abstract":"Recently, enterprises, service provider, and e-businesses confront increasing security and performance challenges. Securing network, host, and on-line application is absolutely important. At the same time, security function must not disturb productivity. To ensure that increasing network traffic is safe and their networks are secure, these organizations must provide security with bias toward solutions that accommodate performance demands, while providing the security and networking features required to run their businesses. That is, best solutions are those that combine high performance with topnotch security. For satisfying those requirements, we have developed hardware based and high performance security gateway system (SGS) which providing security functions such firewall, IDS, rate-limiting, and traffic metering in wire speed. In this paper, we especially describe how H/W based firewall and rate-limiting and their response coordinating engine features are implemented in SGS as a hardware chipset (FPGA)","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117254546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206353
Yeon-Joo Oh, Hoon-Ki Lee, J. Kim, Eui-Hyun H. Paik, Kwang-Roh Park
This paper proposes a digital living network alliance (DLNA) proxy system, to provide services for accessing and sharing various DLNA-based media contents which are distributed over his/her or other's home facilities via home network or the Internet
{"title":"The DLNA Proxy System Architecture for Sharing In-Home Media Contents via Internet","authors":"Yeon-Joo Oh, Hoon-Ki Lee, J. Kim, Eui-Hyun H. Paik, Kwang-Roh Park","doi":"10.1109/ICACT.2006.206353","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206353","url":null,"abstract":"This paper proposes a digital living network alliance (DLNA) proxy system, to provide services for accessing and sharing various DLNA-based media contents which are distributed over his/her or other's home facilities via home network or the Internet","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"25 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120849718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206170
J. M. Ng, Yan Zhang
Group communication has become increasingly important in mobile ad hoc networks. Effective support of group communication is essential for most ad hoc network applications where group communication is a crucial task. In mobile ad hoc network group communications, issues differ from those in wired networks because node mobility causes continuously changing topology in which routes break unpredictably and new routes form dynamically. Network partitioning and merging often occur in group movement scenarios such as in military operations, search and rescue operations etc. Based on these applications, we propose a novel group mobility model, called reference region group mobility (RRGM) model, to describe such group motion behaviors. By using the density-based approach, the size of the region covered by a group can be controlled. With the proposed model, we studied the impact of group formation and group partition on various ad hoc routing protocols. Furthermore, this model can be used in studying issues such as network partition prediction
{"title":"Impact of group mobility on ad hoc networks routing protocols","authors":"J. M. Ng, Yan Zhang","doi":"10.1109/ICACT.2006.206170","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206170","url":null,"abstract":"Group communication has become increasingly important in mobile ad hoc networks. Effective support of group communication is essential for most ad hoc network applications where group communication is a crucial task. In mobile ad hoc network group communications, issues differ from those in wired networks because node mobility causes continuously changing topology in which routes break unpredictably and new routes form dynamically. Network partitioning and merging often occur in group movement scenarios such as in military operations, search and rescue operations etc. Based on these applications, we propose a novel group mobility model, called reference region group mobility (RRGM) model, to describe such group motion behaviors. By using the density-based approach, the size of the region covered by a group can be controlled. With the proposed model, we studied the impact of group formation and group partition on various ad hoc routing protocols. Furthermore, this model can be used in studying issues such as network partition prediction","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124088250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206162
D. Yang, W.C. Lee
In this paper, throughput efficiency of a selective repeat automatic repeat request (SR-ARQ) scheme with controllable packet length in Rayleigh fading channel is analyzed. The slowly Rayleigh fading channel is modeled to two Markov states with known transitional probabilities. Our system has four modes with known transition probabilities with which steady-state probabilities of each system mode can be calculated. With clear form of throughput efficiency, system performance can be directly evaluated so that time consuming simulation can be avoided. Throughput efficiencies in four simulation environments from former article are calculated to get numerical results which are considerably close to the former simulation results
{"title":"Throughput analysis of SR-ARQ scheme with adaptive packet length in slowly varying Rayleigh fading channel","authors":"D. Yang, W.C. Lee","doi":"10.1109/ICACT.2006.206162","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206162","url":null,"abstract":"In this paper, throughput efficiency of a selective repeat automatic repeat request (SR-ARQ) scheme with controllable packet length in Rayleigh fading channel is analyzed. The slowly Rayleigh fading channel is modeled to two Markov states with known transitional probabilities. Our system has four modes with known transition probabilities with which steady-state probabilities of each system mode can be calculated. With clear form of throughput efficiency, system performance can be directly evaluated so that time consuming simulation can be avoided. Throughput efficiencies in four simulation environments from former article are calculated to get numerical results which are considerably close to the former simulation results","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125934137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206431
Jung-Soo Lee, K. Yoon
In this paper, we propose the method of the integration between the DRM (digital rights management) system for the safe distribution of digital content and the fingerprinting system for the trace of the illegal distributor. DRM system is responsible for the safe distribution of the content, however, when an illegal distribution is happened, it can't trace the illegal distributor of the content. So we want to solve this problem through the integration between the DRM system and the fingerprinting system. We describe the condition that is needed in each system for integrating between the DRM and the fingerprinting. And we explain how both systems not only preserve each system's independence but also are effectively interlocked
{"title":"The system integration of DRM and fingerprinting","authors":"Jung-Soo Lee, K. Yoon","doi":"10.1109/ICACT.2006.206431","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206431","url":null,"abstract":"In this paper, we propose the method of the integration between the DRM (digital rights management) system for the safe distribution of digital content and the fingerprinting system for the trace of the illegal distributor. DRM system is responsible for the safe distribution of the content, however, when an illegal distribution is happened, it can't trace the illegal distributor of the content. So we want to solve this problem through the integration between the DRM system and the fingerprinting system. We describe the condition that is needed in each system for integrating between the DRM and the fingerprinting. And we explain how both systems not only preserve each system's independence but also are effectively interlocked","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125952302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206201
Y. M. Kim, Tae-hwa Kim, JungJoo Yoo, Byeong-Whi Kim, Hong-shik Park
In this paper, we study recovery scheme for OBS networks and evaluate performance of recovery scheme through simulation using NS-2. Firstly, we change general restoration procedures proposed by Standard Organization with new restoration procedures considering characteristics of OBS networks. We named it original restoration scheme. Also, we propose a novel enhanced restoration scheme only adjusted to OBS networks. It gives us to reduce the recovery time. We then present performance of original restoration and enhanced restoration scheme using well-known performance metrics. The simulation results can verify that the enhanced restoration scheme has better performance than original restoration scheme
{"title":"Performance comparisons of restoration techniques for fault management in OBS networks","authors":"Y. M. Kim, Tae-hwa Kim, JungJoo Yoo, Byeong-Whi Kim, Hong-shik Park","doi":"10.1109/ICACT.2006.206201","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206201","url":null,"abstract":"In this paper, we study recovery scheme for OBS networks and evaluate performance of recovery scheme through simulation using NS-2. Firstly, we change general restoration procedures proposed by Standard Organization with new restoration procedures considering characteristics of OBS networks. We named it original restoration scheme. Also, we propose a novel enhanced restoration scheme only adjusted to OBS networks. It gives us to reduce the recovery time. We then present performance of original restoration and enhanced restoration scheme using well-known performance metrics. The simulation results can verify that the enhanced restoration scheme has better performance than original restoration scheme","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127029069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206304
J. Han, Wook Hyun, Sun Ok Park, Il-Jin Lee, Miyoung Huh, Shin-Gak Kang
SIP has been used to develop many kinds of SIP service, such as instant messaging, conference and presence, and these various services are being bundled to one application. NAT traversal has long been identified as a large problem when considered in the context of the session initiation protocol (SIP). The problem is further confused by the variety of NATs that are available in the market place today and the large number of potential deployment scenarios. In this paper, we suggest an ALG which operates inside NAT for traversal of SIP transactions
{"title":"An application level gateway for traversal of SIP transaction through NATs","authors":"J. Han, Wook Hyun, Sun Ok Park, Il-Jin Lee, Miyoung Huh, Shin-Gak Kang","doi":"10.1109/ICACT.2006.206304","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206304","url":null,"abstract":"SIP has been used to develop many kinds of SIP service, such as instant messaging, conference and presence, and these various services are being bundled to one application. NAT traversal has long been identified as a large problem when considered in the context of the session initiation protocol (SIP). The problem is further confused by the variety of NATs that are available in the market place today and the large number of potential deployment scenarios. In this paper, we suggest an ALG which operates inside NAT for traversal of SIP transactions","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128988665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206323
Sungjoo Kang, K. Ku, J. Shim, S. Hur, S. H. Ju, W. Choi
In this paper, we propose the streaming server architecture for massive users and verify it by a small scale simulation with virtual users. Software streaming is one of the ASP solution that allows the execution of stream-enabled software, even while the transmission of the program may still be in progress. In this paper, we analyze workload characteristics of the software stream, and extract four requirements that software streaming system have to satisfy. Based on these requirements, we design the software streaming server architecture. The verification of the designed server is performed by virtual user simulation. The result tells us the capacity of each server and helps us to calculate the scale of the system for massive users
{"title":"Performance evaluation of software streaming server architecture for massive users","authors":"Sungjoo Kang, K. Ku, J. Shim, S. Hur, S. H. Ju, W. Choi","doi":"10.1109/ICACT.2006.206323","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206323","url":null,"abstract":"In this paper, we propose the streaming server architecture for massive users and verify it by a small scale simulation with virtual users. Software streaming is one of the ASP solution that allows the execution of stream-enabled software, even while the transmission of the program may still be in progress. In this paper, we analyze workload characteristics of the software stream, and extract four requirements that software streaming system have to satisfy. Based on these requirements, we design the software streaming server architecture. The verification of the designed server is performed by virtual user simulation. The result tells us the capacity of each server and helps us to calculate the scale of the system for massive users","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125673365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}