By Topic

IEEE Network

Issue 1 • Jan.-Feb. 1996

Filter Results

Displaying Results 1 - 13 of 13
  • Desktop KornShell Graphical Programming [New Books]

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (152 KB)
    Freely Available from IEEE
  • UNIX for the Impatient, Second Edition [New Books]

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (152 KB)
    Freely Available from IEEE
  • ATM User-Network Interface (UNI) Specification, Version 3.1 [New Books]

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (152 KB)
    Freely Available from IEEE
  • Data Communications: From Basics to Broadband, Second Edition [New Books]

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (152 KB)
    Freely Available from IEEE
  • Network Programming with Windows Sockets [New Books]

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (152 KB)
    Freely Available from IEEE
  • UNIX Internetworking, Second Edition [New Books]

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (133 KB)
    Freely Available from IEEE
  • Managing Computer Networks: A Case-Based Reasoning Approach [New Books]

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (133 KB)
    Freely Available from IEEE
  • IPng: Internef Protocol Next Generation [New books]

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (133 KB)
    Freely Available from IEEE
  • Asynchronous Transfer Mode: Solution for Broadband ISDN, Third Edition [New Books]

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (133 KB)
    Freely Available from IEEE
  • Cooperating security managers: a peer-based intrusion detection system

    Publication Year: 1996, Page(s):20 - 23
    Cited by:  Papers (95)  |  Patents (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    The need for increased security measures in computer systems and networks is apparent through the frequent media accounts of computer system and network intrusions. One attempt at increasing security measures is in the area of intrusion detection packages. These packages use a variety of means to detect intrusive activities and have been applied to both individual computer systems and networks. Co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On multicast support for shared-memory-based ATM switch architecture

    Publication Year: 1996, Page(s):34 - 39
    Cited by:  Papers (19)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    Because of its superior performance characteristics in terms of cell loss and throughput for a given memory space, shared-memory ATM switches have gained significant importance in handling bursty traffic in ATM networks. Because of its increased effective load, multicast traffic requires an even greater increase in switching capacity than a shared-memory-based ATM switching system can provide. In ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Congestion control for best-effort service: why we need a new paradigm

    Publication Year: 1996, Page(s):10 - 19
    Cited by:  Papers (28)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2036 KB)

    The current congestion control paradigm assumes that end users will use a single mandated algorithm. While the work done in this area has proven to be of great value, we need to recognize as a community that this paradigm is clearly inappropriate for future public networks. The reformulation of congestion control for best-effort service is discussed. We are not attempting to design specific new co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparison between the OSI reference model and the B-ISDN protocol reference model

    Publication Year: 1996, Page(s):24 - 33
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1292 KB)

    The author presents views on the relationships between the Open Systems Interconnection (OSI) reference model (RM) and the broadband integrated services digital network (B-ISDN) protocol reference model (PRM), in an attempt to facilitate an interconnection between B-ISDN and data networks conforming to the OSI standards. According to the International Telecommunications Union-Telecommunications Se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

As currently defined, IEEE Network covers the following areas: 1. network protocols and architectures, 2. Protocol design and validation, 3. Communication software and its development and test, 4. Network control and signalling, 5. network management, 6. Practical network implementations including local area networks, (LANs), metropolitan area networks (MANs), and wide  area networks, (WANs), 7. Switching and processing in integrated (voice/data) networks and network components, 8. Micro-to-host communication.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief

Nei Kato
Tohoku University, Japan
kato@it.is.tohoku.ac.jp