Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245886
Juyoung Park, E. Kwon, O. Jung, S. Kang
IP multicast shows very strong advantage in the group communication services. But to deploy IP multicast in the current Internet, every IP routers must be changed into multicast enabled ones and several deployment issues should be solved. So theses problems prevent IP multicast mechanism from being deployed in IP world. And these problems give a good reason why today's group communication uses replicated IP unicast mechanism instead of IP multicast. Recently an overlay multicast is proposed as an alternative method of IP multicast. We propose a framework as an application-layer way to provide end-to-end multicast services over IP-network environment. In this paper we define the basic concepts of relayed multicast scheme, data delivery models, service scenarios and some test issues of RMCP as well as implementation and test on APAN
{"title":"Relayed multicast protocol for 1-to-many group communications","authors":"Juyoung Park, E. Kwon, O. Jung, S. Kang","doi":"10.1109/ICACT.2005.245886","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245886","url":null,"abstract":"IP multicast shows very strong advantage in the group communication services. But to deploy IP multicast in the current Internet, every IP routers must be changed into multicast enabled ones and several deployment issues should be solved. So theses problems prevent IP multicast mechanism from being deployed in IP world. And these problems give a good reason why today's group communication uses replicated IP unicast mechanism instead of IP multicast. Recently an overlay multicast is proposed as an alternative method of IP multicast. We propose a framework as an application-layer way to provide end-to-end multicast services over IP-network environment. In this paper we define the basic concepts of relayed multicast scheme, data delivery models, service scenarios and some test issues of RMCP as well as implementation and test on APAN","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126714101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245900
Xin Jin, Xiande Liu, Zhongmin Wang
This paper discusses the NP-complete multi-constrained path problem with imprecise state information, and a distributed heuristic framework without any imprecision assumption is presented. This framework needs no link state exchanging message, and employs mobile agents to search feasible paths in parallel. Two key strategies are used: to select a suitable next node, and to choose the appropriate one from all feasible paths. Simulation results indicate that the presented solution is scaleable and efficient. An appropriate path selecting strategy with traffic engineering can improve network performance. And the framework can tolerate high degree of information imprecision
{"title":"Routing for multi-constrained path problem with imprecise state information","authors":"Xin Jin, Xiande Liu, Zhongmin Wang","doi":"10.1109/ICACT.2005.245900","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245900","url":null,"abstract":"This paper discusses the NP-complete multi-constrained path problem with imprecise state information, and a distributed heuristic framework without any imprecision assumption is presented. This framework needs no link state exchanging message, and employs mobile agents to search feasible paths in parallel. Two key strategies are used: to select a suitable next node, and to choose the appropriate one from all feasible paths. Simulation results indicate that the presented solution is scaleable and efficient. An appropriate path selecting strategy with traffic engineering can improve network performance. And the framework can tolerate high degree of information imprecision","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126370772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245899
Moonjeong Chang, Meejeong Lee, H. Lee
In this paper, we propose a transport layer load distribution mechanism utilizing the multiple network interfaces simultaneously. We specifically propose an extension of stream control transmission protocol (SCTP) to have load sharing over multiple network interfaces. We named the particular service provided by the proposed load sharing mechanism to be LSMS (load sharing mode service). We show through simulations that LSMS of SCTP effectively performs bandwidth aggregation even when the difference of the properties of the paths, such as the delay and bandwidth, is large
{"title":"A load-sharing scheme in transport layer for improving throughput","authors":"Moonjeong Chang, Meejeong Lee, H. Lee","doi":"10.1109/ICACT.2005.245899","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245899","url":null,"abstract":"In this paper, we propose a transport layer load distribution mechanism utilizing the multiple network interfaces simultaneously. We specifically propose an extension of stream control transmission protocol (SCTP) to have load sharing over multiple network interfaces. We named the particular service provided by the proposed load sharing mechanism to be LSMS (load sharing mode service). We show through simulations that LSMS of SCTP effectively performs bandwidth aggregation even when the difference of the properties of the paths, such as the delay and bandwidth, is large","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116240728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246230
Haixia Zhang, D. Yuan, Feng Zhao
An important discovery about the PAPR in multicarrier modulation (MCM) systems with different orthogonal base is reported at the first time. In this paper PAPR of MCM is gained respectively by employing seven different kinds of orthogonal bases, six of which are wavelet bases and one is the well-known Fourier base. Simulation results show that according to PAPR of Fourier based MCM (OFDM) outperforms those based on wavelet regardless of which wavelet is chosen
{"title":"PAPR comparison of different orthogonal base in multicarrier systems","authors":"Haixia Zhang, D. Yuan, Feng Zhao","doi":"10.1109/ICACT.2005.246230","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246230","url":null,"abstract":"An important discovery about the PAPR in multicarrier modulation (MCM) systems with different orthogonal base is reported at the first time. In this paper PAPR of MCM is gained respectively by employing seven different kinds of orthogonal bases, six of which are wavelet bases and one is the well-known Fourier base. Simulation results show that according to PAPR of Fourier based MCM (OFDM) outperforms those based on wavelet regardless of which wavelet is chosen","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121179691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245845
Man-ho Park, Song-in Choi, Siho Kim, Keun-Sung Bae
A binaural filtering method using HRTF database is generally used to make the headphone-based 3D sound. this method can create some confusion between the front and back directions or between the up and down directions due to the non-individual HRTF that depends on each listener. To reduce the confusion of sound image localization, we propose a new method to boost the spectral cue by modifying the HRTF spectra with spectrum difference between the front and back directions. Informal listening tests show that the proposed method improves the front-back sound localization characteristics much better than the conventional methods
{"title":"Improvement of front-back sound localization characteristics in headphone-based 3D sound generation","authors":"Man-ho Park, Song-in Choi, Siho Kim, Keun-Sung Bae","doi":"10.1109/ICACT.2005.245845","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245845","url":null,"abstract":"A binaural filtering method using HRTF database is generally used to make the headphone-based 3D sound. this method can create some confusion between the front and back directions or between the up and down directions due to the non-individual HRTF that depends on each listener. To reduce the confusion of sound image localization, we propose a new method to boost the spectral cue by modifying the HRTF spectra with spectrum difference between the front and back directions. Informal listening tests show that the proposed method improves the front-back sound localization characteristics much better than the conventional methods","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116605645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245959
Hwan-Kuk Kim, Yangseo Choi, D. Seo
Currently, Internet is deeply rooted in everyday life and many things are performed using Internet in real world. Internet users increased because of convenience. But then, Internet accident is on the increase rapidly. Recently, large scale network attack infestations, as seen last year in the cases Code Red, Nimda, are a cause great concern for the computer security communication. These network worm attack becomes the biggest threat that could be the down utility of network availability. Therefore, it needs high efficiency information protection system development. And the security companies have developed numerous security reinforcement systems to protect systems and networks from various intrusions. A traditional performing test tools are not adequate for testing and benchmarking of security solutions against exploits (attacks on a network), Trojans (viruses), DoS attacks, and other intrusions. Also, there are many individual test suites to evaluate security solutions. However, automating testing eliminates the effects of individual differences. Therefore, it is necessary that test suites generate automatically various attack patterns, and traffics based scenario on purpose to analyze the functional stability and performance of security solution. In this paper, we describe a method of design and implementation about AGT (attack generation test suite) simulator based scenario, which generate various attack patterns using multiple agents
{"title":"Design of attack generation test-suite based scenario for security solutions testing","authors":"Hwan-Kuk Kim, Yangseo Choi, D. Seo","doi":"10.1109/ICACT.2005.245959","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245959","url":null,"abstract":"Currently, Internet is deeply rooted in everyday life and many things are performed using Internet in real world. Internet users increased because of convenience. But then, Internet accident is on the increase rapidly. Recently, large scale network attack infestations, as seen last year in the cases Code Red, Nimda, are a cause great concern for the computer security communication. These network worm attack becomes the biggest threat that could be the down utility of network availability. Therefore, it needs high efficiency information protection system development. And the security companies have developed numerous security reinforcement systems to protect systems and networks from various intrusions. A traditional performing test tools are not adequate for testing and benchmarking of security solutions against exploits (attacks on a network), Trojans (viruses), DoS attacks, and other intrusions. Also, there are many individual test suites to evaluate security solutions. However, automating testing eliminates the effects of individual differences. Therefore, it is necessary that test suites generate automatically various attack patterns, and traffics based scenario on purpose to analyze the functional stability and performance of security solution. In this paper, we describe a method of design and implementation about AGT (attack generation test suite) simulator based scenario, which generate various attack patterns using multiple agents","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122699110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245994
Heeyoung Jung, JongWha Yi
This paper proposes an extension scheme to support effectively real-time services in Mobile IPv6. The proposed scheme could very simplify the handover procedure by using the proposed reserved addresses scheme and layer 2 triggers so that it could considerably reduce handover latency in Mobile IPv6. The performance analysis shows that the handover latency in the proposed scheme could be reduced by a minimum of 1 second, maximum of above 3 second as compared to that of basic Mobile IPv6. Accordingly the proposed scheme could be considered as a strong candidate to support real-time services like VoIP in future network based on Mobile IPv6
{"title":"An effective handover scheme using the reserved addresses in mobile IPv6","authors":"Heeyoung Jung, JongWha Yi","doi":"10.1109/ICACT.2005.245994","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245994","url":null,"abstract":"This paper proposes an extension scheme to support effectively real-time services in Mobile IPv6. The proposed scheme could very simplify the handover procedure by using the proposed reserved addresses scheme and layer 2 triggers so that it could considerably reduce handover latency in Mobile IPv6. The performance analysis shows that the handover latency in the proposed scheme could be reduced by a minimum of 1 second, maximum of above 3 second as compared to that of basic Mobile IPv6. Accordingly the proposed scheme could be considered as a strong candidate to support real-time services like VoIP in future network based on Mobile IPv6","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131600580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245879
Joo-Young Lee, Kiyoung Moon
Security for agents on the semantic Web is vital because they usually handle a lot of privacy related information. Using this information such like financial information, agents purchase goods, reserve hotels, flights, and cars and make a contract with others on behalf of their users. These features bring them more subtle attacks and dangers. For example, sensitive information about the user may be disclosed or sabotaged by malicious parties. In this paper, we suggest a method to build secure agents on the semantic Web as a solution to this problem. Especially because agents have charges of different and various roles on the distributed systems and platforms on the semantic Web, required qualification for access to resource is dynamically changed according to the case. Therefore, at the first, we discuss the requirement of agent security on the semantic Web and propose a method that the agent dynamically exchanges its authentication and authorization information using SAML (security assertion markup language). Because SAML doesn't need to share same security infrastructure and allows applications to exchange authentication and authorization information, it is suitable for securing the agent that plays various roles in heterogeneous platforms, dynamically changes their requirements, and acts on behalf of users with diverse access permission on the semantic Web. In addition to this, since SAML is based on XML, it has an advantage of easy integration and extension without modification of legacy system and protocol on the semantic Web
{"title":"Building secure agents on the semantic web","authors":"Joo-Young Lee, Kiyoung Moon","doi":"10.1109/ICACT.2005.245879","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245879","url":null,"abstract":"Security for agents on the semantic Web is vital because they usually handle a lot of privacy related information. Using this information such like financial information, agents purchase goods, reserve hotels, flights, and cars and make a contract with others on behalf of their users. These features bring them more subtle attacks and dangers. For example, sensitive information about the user may be disclosed or sabotaged by malicious parties. In this paper, we suggest a method to build secure agents on the semantic Web as a solution to this problem. Especially because agents have charges of different and various roles on the distributed systems and platforms on the semantic Web, required qualification for access to resource is dynamically changed according to the case. Therefore, at the first, we discuss the requirement of agent security on the semantic Web and propose a method that the agent dynamically exchanges its authentication and authorization information using SAML (security assertion markup language). Because SAML doesn't need to share same security infrastructure and allows applications to exchange authentication and authorization information, it is suitable for securing the agent that plays various roles in heterogeneous platforms, dynamically changes their requirements, and acts on behalf of users with diverse access permission on the semantic Web. In addition to this, since SAML is based on XML, it has an advantage of easy integration and extension without modification of legacy system and protocol on the semantic Web","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127582695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246020
J.N. Niya, A. Aghagolzadeh, M. A. Tinati, S. Feizi
In this paper we propose a new wavelet-based approach for solving edge detection problem. Using primary knowledge of the direction of the edges extracted by ordinary separable and isotropic wavelet transform, we can classify the pixels as edge points, background and candidate edge point. For the candidate edge points, we propose implementing the Gabor and Cauchy directional wavelets and detecting the edge points precisely
{"title":"2-step wavelet-based edge detection using gabor and cauchy directional wavelets","authors":"J.N. Niya, A. Aghagolzadeh, M. A. Tinati, S. Feizi","doi":"10.1109/ICACT.2005.246020","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246020","url":null,"abstract":"In this paper we propose a new wavelet-based approach for solving edge detection problem. Using primary knowledge of the direction of the edges extracted by ordinary separable and isotropic wavelet transform, we can classify the pixels as edge points, background and candidate edge point. For the candidate edge points, we propose implementing the Gabor and Cauchy directional wavelets and detecting the edge points precisely","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127800966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245940
Minho Han, Jeong-Nyeo Kim, Jongsoo Jang
Network processors in general, enable us to add, through software, the latest-and-greatest network services while maintaining high packet throughput and low packet latency. Simply put, the network processors offer performance and flexibility for implementing network service. IPSec is a set of protocols developed by the IETF to support secures exchange of packets at the IP layer. This paper describes the design of an IPSec application using the Intel IXP2400 network processor. The application described in this paper is supported on the Intel IXDP2400 advanced development platform
{"title":"The design of IPSec application in lXDP2400","authors":"Minho Han, Jeong-Nyeo Kim, Jongsoo Jang","doi":"10.1109/ICACT.2005.245940","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245940","url":null,"abstract":"Network processors in general, enable us to add, through software, the latest-and-greatest network services while maintaining high packet throughput and low packet latency. Simply put, the network processors offer performance and flexibility for implementing network service. IPSec is a set of protocols developed by the IETF to support secures exchange of packets at the IP layer. This paper describes the design of an IPSec application using the Intel IXP2400 network processor. The application described in this paper is supported on the Intel IXDP2400 advanced development platform","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"590 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128076617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}