scispace - formally typeset
Search or ask a question

Showing papers by "Choong Seon Hong published in 2004"


Book ChapterDOI
TL;DR: An XML-based workflow control scheme incorporating the workflow patterns for providing telecommunications services and a scenario for the delivery of the BGP/MPLS VPN service adopting the proposed workflow-based service delivery architecture are described.
Abstract: In a competitive telecommunications marketplace, operators must provide customers with rapid access to both new and traditional service offerings. Market share is developed through greater customer satisfaction and by reducing dissatisfaction. To maximize profitability, an operator must reduce the costs of delivering new services while building revenues from existing services. This paper proposes a workflow-based service delivery architecture for telecommunications services. We describe an business process management in telecommunications and propose the workflow patterns that are commonly applicable for the workflow management of the proposed telecommunications architecture. In addition, this paper proposes an XML-based workflow control scheme incorporating the workflow patterns for providing telecommunications services. Finally, we describe a scenario for the delivery of the BGP/MPLS VPN service adopting the proposed workflow-based service delivery architecture.

2 citations


Book ChapterDOI
14 May 2004
TL;DR: This paper proposes a secure network management protocol that adopts the policy-based network management and the XML security features to the existing SNMPv3.
Abstract: Simple Network Management Protocol (SNMP) is the most widely-used network management protocol for TCP/IP-based networks. The functionality of SNMP was enhanced with the publication of SNMPv2. However, both versions of SNMPv1 and SNMPv2 lack security features, notably authentication and privacy. The SNMPv3 solves these deficiencies but it has some inefficiency to deal with the access, service refusal, or unstable action. On the other hand, XML is being used to describe components and applications in a vendor and language neutral. In this paper, we propose a policy-based SNMP security management architecture using XML. We propose a secure network management protocol that adopts the policy-based network management and the XML security features to the existing SNMPv3.

1 citations


Book ChapterDOI
14 May 2004
TL;DR: A mechanism to enhance the wireless LAN security protection related information as WEP key that can occur during message transmissions between APs by replacing the movement paths for IAPP move requests or response messages with the existing movement path utilizing the public key for transmission between above APs is proposed.
Abstract: Wireless LAN (WLAN) refers to the wireless network environment constructed indoors or outdoors, by using either the radio or light wave technology instead of wire signals from the hub to such clients as PCs (Personal Computer), notebook PCs and PDAs. TGf (Task Group F), among IEEE 802.11 WGs (Working Groups), is currently under formulation of the standard protocols for communication between WLAN Access Points (APs). This Group has proposed IAPP (Inter Access Point Protocol) designed to secure the interoperability between AP sets produced by different vendors. This is a protocol for securing mobility among APs within sub-networks. It offers seamless connectivity between stations (STAs) by sharing security context or Layer 2 forwarding data between APs without re-authentication when STAs move around among them. In this paper, we propose a mechanism to enhance the wireless LAN security protection related information as WEP key that can occur during message transmissions between APs by replacing the movement paths for IAPP move requests or response messages with the existing movement path utilizing the public key for transmission between above APs.

1 citations


Book ChapterDOI
14 May 2004
TL;DR: A fast handover mechanism to use mobility prediction table over wireless LAN for fast moving mobile node to change its point of attachment from one network to another is proposed.
Abstract: Mobile IPv6 enables mobile node to roam transparently in any network. It shows good performance for macro mobility but it is not proper for supporting micro mobility because of large latency. Accordingly, IETF (Internet Engineering Task Force) mobileip WG(Working Group) suggests Fast Handover Protocol and HMIPv6(Hierarchical Mobile IPv6) for micro mobility management. However, HMIPv6 has some problems of scalability if the mobility anchor point handles too many mobile nodes, and fast handover protocol has problem that mobile node can not send an L3 packet once it has started an L2 handover. So existing protocols currently do not support a suitable handover mechanism to allow a fast moving mobile node to change its point of attachment from one network to another. In this paper, we propose a fast handover mechanism to use mobility prediction table over wireless LAN for fast moving mobile node. We evaluated packet loss in our proposed mechanism using mobility prediction with various fast handover schemes. Simulation results show effectiveness of our scheme.

1 citations


Book ChapterDOI
18 Feb 2004
TL;DR: A hierarchical routing scheme that can provide a globally-optimal route in hierarchical MPLS networks using propagation from the Condensed Subordinate Route Information (CSRI).
Abstract: In this paper, we propose a scalable Label Switched Path (LSP) management architecture for Multiprotocol Label Switching (MPLS) traffic engineering using a hierarchical network model. MPLS introduces the concept of a label hierarchy to support scalability by lessening the complexity of transit routers for the computation of complete routing tables. However, this hierarchical network model creates a critical disadvantage in providing a globally-optimal route because of topology abstraction or aggregation. This paper proposes a hierarchical routing scheme that can provide a globally-optimal route in hierarchical MPLS networks using propagation from the Condensed Subordinate Route Information (CSRI). CSRI is summarized route information among border nodes in the lower layer network and is reflected in the process of the LSP path computation in the higher layer network. We also propose the algorithms for generation of CSRI, for reflection CSRI to higher layer network topology, and for computation of an optimal LSP in a higher layer.

Journal ArticleDOI
TL;DR: This paper presents a watermarking algorithm based on wavelet domain, and the watermark is embedded into large coefficients in region of interest (ROI) being based on principle of multi-threshold watermark coding (MTWC) for robust watermark insertion.
Abstract: General watermarking techniques tend not to consider intrinsic characteristics of image, so that watermarks are embeded to entire images. In this paper, we present a watermarking algorithm based on wavelet domain, and the watermark is embedded into large coefficients in region of interest(ROI) being based on principle of multi-threshold watermark coding(MTWC) for robust watermark insertion. We try to accomplish both image duality and robustness using human visual system(HVS). The watermarks are embedded in middle frequency bands because the distortion degree of watermarked images appears to be less than lower frequency bands, and the embedded watermarks in the middle bands showed high extraction ratios after some distortion. The watermarks are consisted of pseudo random sequences and detected using Cox`s similarity mesurement.

Book ChapterDOI
14 May 2004
TL;DR: In this paper, the authors proposed a system using active network technology and allowing detecting attack at active router near protected server using dynamic, adaptive detecting algorithm. But the amount of attack packets are small at upstream node and it is hard to detect an occurrence of an attack.
Abstract: To solve the congestion problem, network nodes at near the zombies need to filter the attack traffic. But the amounts of attack packets are small at upstream node and it is hard to detect an occurrence of an attack. In this case, the network node near the protected site should perform attack detection. Our proposed system uses active network technology and allowing detecting attack at active router near protected server. This detecting process uses dynamic, adaptive detecting algorithm. Elementary classification will reduce network congestion and adaptive classification will reduce error detecting rate. Signatures which are created by these two classifications are transferred to other active routers. And then they perform filtering process based on signatures.

Journal ArticleDOI
TL;DR: The hierarchical network model in deploying ADSL services across the ATM access networks, which can easily accommodate the explosive growth of ADSL subscribers in the future is described.
Abstract: This paper proposes a distributed networking system architecture for Internet-access service provision using ATM over xDSL technology. We describe the hierarchical network model in deploying ADSL services across the ATM access networks, which can easily accommodate the explosive growth of ADSL subscribers in the future. In addition, this paper describes the distributed networking system and its capability to provide a systemic network management using the principal networking concepts of service ordering, addressing, routing, adaptation and switching. All of the networking system components with CORBA objects in favor of the distribution and location transparency are defined and described using the CORBA interface description language (IDL) for commonality. Lastly, we present its implementation and operation in Korea Telecom.