Scheduled System Maintenance
On Saturday, December 10, single article sales and account management will be unavailable from 5:00 AM-7:30 PM ET.
We apologize for the inconvenience.
By Topic

IEEE Network

Issue 4 • Jul/Aug 2000

Filter Results

Displaying Results 1 - 6 of 6
  • A comparison of load balancing techniques for scalable Web servers

    Publication Year: 2000, Page(s):58 - 64
    Cited by:  Papers (78)  |  Patents (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB)

    Scalable Web servers can be built using a network of workstations where server capacity can be extended by adding new workstations as the workload increases. The topic of our article is a comparison of different method to do load-balancing of HTTP traffic for scalable Web servers. We present a classification framework the different load-balancing methods and compare their performance. In addition,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing electronic commerce: reducing the SSL overhead

    Publication Year: 2000, Page(s):8 - 16
    Cited by:  Papers (18)  |  Patents (32)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB)

    The last couple of years have seen a growing momentum toward using the Internet for conducting business. Web-based electronic commerce applications are one of the fastest growing segments of the Internet today. A key enabler for e-commerce applications is the ability to setup secure private channels over a public network. The Secure Sockets Layer protocol provides this capability and is the most w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Methods and protocols for secure key negotiation using IKE

    Publication Year: 2000, Page(s):18 - 29
    Cited by:  Papers (4)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1052 KB)

    The IETF has advanced the IPsec protocols to draft standard status. These protocols include mechanisms for the establishment of a secure channel, via cryptographic key exchange, over an insecure medium. Such a channel can then be used for ensuring the confidentiality, authentication, and/or integrity of the communications between two parties. We explain the algorithms and protocols of IPsec's Inte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Continuous media e-mail on the Internet: infrastructure inadequacies and a sender-side solution

    Publication Year: 2000, Page(s):30 - 37
    Cited by:  Papers (12)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (788 KB)

    This article examines how the Internet's e-mail infrastructure should evolve to better support continuous media e-mail, such as audio and video. We assert that the problem is not simply a matter of adding the obvious new functionality to user agents (mail readers), such as audio and video capture, but requires the adoption a new delivery model. We do this by examining the problems that arise using... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced services architectures for Internet telephony: a critical overview

    Publication Year: 2000, Page(s):38 - 44
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (692 KB)

    Advanced services are differentiating factors and crucial to service providers' survival and success. Examples are credit card calling, call forwarding, and toll-free calling. In classical telephony's early days their implementation was embedded in switching software, and this hindered fast deployment. A more modern architecture known as the intelligent network (IN) was born in the 1980s, allowing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Internet: a global telecommunications solution?

    Publication Year: 2000, Page(s):46 - 57
    Cited by:  Papers (17)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1364 KB)

    The provision and support of new distributed multimedia services are of prime concern for telecommunications operators and suppliers. Clearly, the potential of the latest Internet protocols to contribute communications components is of considerable interest to them. In this article we first review some of the new types of application and their requirements, and identify the need to support applica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

As currently defined, IEEE Network covers the following areas: 1. network protocols and architectures, 2. Protocol design and validation, 3. Communication software and its development and test, 4. Network control and signalling, 5. network management, 6. Practical network implementations including local area networks, (LANs), metropolitan area networks (MANs), and wide  area networks, (WANs), 7. Switching and processing in integrated (voice/data) networks and network components, 8. Micro-to-host communication.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief

Nei Kato
Tohoku University, Japan
kato@it.is.tohoku.ac.jp