By Topic

Network, IEEE

Issue 4 • Date Jul/Aug 2000

Filter Results

Displaying Results 1 - 6 of 6
  • Advanced services architectures for Internet telephony: a critical overview

    Publication Year: 2000 , Page(s): 38 - 44
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (692 KB)  

    Advanced services are differentiating factors and crucial to service providers' survival and success. Examples are credit card calling, call forwarding, and toll-free calling. In classical telephony's early days their implementation was embedded in switching software, and this hindered fast deployment. A more modern architecture known as the intelligent network (IN) was born in the 1980s, allowing implementation in separate nodes, resulting in faster deployment of new services. Two tracks are emerging for Internet telephony: one from the ITU-T and the other from the IETF. As far as advanced services are concerned, the ITU-T track offers a rather archaic architecture, reminiscent of the early days of classical telephony. On the other hand, the IETF architecture, although more modern, does have a few pitfalls. There is plenty of room for improvement to both. This article scrutinizes the ITU-T and IETF advanced services architectures for Internet telephony. Salient features are reviewed and weaknesses pinpointed. Although these architectures are constantly evolving, alternatives may emerge. We provide a discussion of two potential alternatives: IN-based architectures and mobile-agent-based architectures View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Methods and protocols for secure key negotiation using IKE

    Publication Year: 2000 , Page(s): 18 - 29
    Cited by:  Papers (3)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1052 KB)  

    The IETF has advanced the IPsec protocols to draft standard status. These protocols include mechanisms for the establishment of a secure channel, via cryptographic key exchange, over an insecure medium. Such a channel can then be used for ensuring the confidentiality, authentication, and/or integrity of the communications between two parties. We explain the algorithms and protocols of IPsec's Internet Key Exchange (IKE) and discuss the types of security that the various IKE modes provide View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Internet: a global telecommunications solution?

    Publication Year: 2000 , Page(s): 46 - 57
    Cited by:  Papers (5)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1364 KB)  

    The provision and support of new distributed multimedia services are of prime concern for telecommunications operators and suppliers. Clearly, the potential of the latest Internet protocols to contribute communications components is of considerable interest to them. In this article we first review some of the new types of application and their requirements, and identify the need to support applications that have strict QoS requirements, the so-called critical applications. We review two proposals for enhancing the Internet service architecture. In addition to the integrated services work of the IETF, we look at the proposals for differentiated services in the Internet. We then individually review protocol developments proposed to improve the Internet, and to support real-time and multimedia communications. These are IPv6 (the new version of the Internet Protocol), Resource reSerVation Protocol, and Multiprotocol Label Switching, respectively. In each case, we attempt to provide critical reviews in order to assess their suitability for this purpose. Finally, we indicate what the basis of the future infrastructure might be in order to support the full variety of application requirements View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Continuous media e-mail on the Internet: infrastructure inadequacies and a sender-side solution

    Publication Year: 2000 , Page(s): 30 - 37
    Cited by:  Papers (6)  |  Patents (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (788 KB)  

    This article examines how the Internet's e-mail infrastructure should evolve to better support continuous media e-mail, such as audio and video. We assert that the problem is not simply a matter of adding the obvious new functionality to user agents (mail readers), such as audio and video capture, but requires the adoption a new delivery model. We do this by examining the problems that arise using current methods to deliver video messages, and we show how sender-side storage and media streaming solve these problems. Finally, we describe an implementation strategy that requires changes only to individual sender systems, but enables CM e-mail to be delivered universally to any recipient, thus providing a realistic evolutionary path that can be adopted incrementally by individual mail systems View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparison of load balancing techniques for scalable Web servers

    Publication Year: 2000 , Page(s): 58 - 64
    Cited by:  Papers (40)  |  Patents (21)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (716 KB)  

    Scalable Web servers can be built using a network of workstations where server capacity can be extended by adding new workstations as the workload increases. The topic of our article is a comparison of different method to do load-balancing of HTTP traffic for scalable Web servers. We present a classification framework the different load-balancing methods and compare their performance. In addition, we evaluate in detail one class of methods using a prototype implementation with instruction-level analysis of processing overhead. The comparison is based on a trace driven simulation of traces from a large ISP (Internet Service Provider) in Norway. The simulation model is used to analyze different load-balancing schemes based on redirection of request in the network and redirection in the mapping between a canonical name (CNAME) and IP address. The latter is vulnerable to spatial and temporal locality, although for the set of traces used, the impact of locality is limited. The best performance is obtained with redirection in the network View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing electronic commerce: reducing the SSL overhead

    Publication Year: 2000 , Page(s): 8 - 16
    Cited by:  Papers (15)  |  Patents (32)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (864 KB)  

    The last couple of years have seen a growing momentum toward using the Internet for conducting business. Web-based electronic commerce applications are one of the fastest growing segments of the Internet today. A key enabler for e-commerce applications is the ability to setup secure private channels over a public network. The Secure Sockets Layer protocol provides this capability and is the most widely used security protocol in the Internet. We take a close look at the working principles behind SSL with an eye on performance. We benchmark two of the popular Web servers in wide use in a number of large e-commerce sites. Our results show that the overheads due to SSL can make Web servers slower by a couple of orders of magnitude. We investigate the reason for this deficiency by instrumenting the SSL protocol stack with a detailed profiling of the protocol processing components. In light of our observations, we outline architectural guidelines for large e-commerce sites View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Network covers topics which include: network protocols and architecture; protocol design and validation; communications software; network control, signaling and management; network implementation (LAN, MAN, WAN); and micro-to-host communications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Xuemin (Sherman) Shen, PhD
Engineering University of Waterloo