By Topic

IEEE Communications Magazine

Issue 10 • Date Oct. 2002

Filter Results

Displaying Results 1 - 16 of 16
  • Book Reviews

    Publication Year: 2002, Page(s):20 - 22
    Request permission for commercial reuse | PDF file iconPDF (267 KB) | HTML iconHTML
    Freely Available from IEEE
  • Perspectives - Global communities in IEEE standardization

    Publication Year: 2002, Page(s): 24
    Request permission for commercial reuse | PDF file iconPDF (242 KB) | HTML iconHTML
    Freely Available from IEEE
  • Telecommunication Networks Security - Guest Editorial

    Publication Year: 2002, Page(s):40 - 41
    Request permission for commercial reuse | PDF file iconPDF (331 KB) | HTML iconHTML
    Freely Available from IEEE
  • Squeezing digital subscriber lines for more efficiency - guest editorial

    Publication Year: 2002, Page(s):84 - 85
    Request permission for commercial reuse | PDF file iconPDF (283 KB) | HTML iconHTML
    Freely Available from IEEE
  • Multi-timescale Internet traffic engineering

    Publication Year: 2002, Page(s):125 - 131
    Cited by:  Papers (2)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1304 KB) | HTML iconHTML

    The Internet is a collection of packet-based hop-by-hop routed networks. Internet traffic engineering is the process of allocating resources to meet the performance requirements of users and operators for their traffic. Current mechanisms for doing so, exemplified by TCP's congestion control or the variety of packet marking disciplines, concentrate on allocating resources on a per-packet basis or ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traffic engineering with traditional IP routing protocols

    Publication Year: 2002, Page(s):118 - 124
    Cited by:  Papers (159)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1398 KB) | HTML iconHTML

    Traffic engineering involves adapting the routing of traffic to network conditions, with the joint goals of good user performance and efficient use of network resources. We describe an approach to intradomain traffic engineering that works within the existing deployed base of interior gateway protocols, such as Open Shortest Path First and Intermediate System-Intermediate System. We explain how to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • STEM: Secure Telephony Enabled Middlebox

    Publication Year: 2002, Page(s):52 - 58
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1248 KB) | HTML iconHTML

    Dynamic applications, including IP telephony, have not seen wide acceptance within enterprises because of problems caused by the existing network infrastructure. Static elements, including firewalls and network address translation devices, are not capable of allowing dynamic applications to operate properly. The Secure Telephony Enabled Middlebox (STEM) architecture is an enhancement of the existi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Channelized voice over digital subscriber line

    Publication Year: 2002, Page(s):94 - 100
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (911 KB) | HTML iconHTML

    This article presents a promising voice over digital subscriber line (VoDSL) solution: an alternative method that uses physical layer transportation to provide channelized VoDSL (CVoDSL). This article also presents the advantages that the CVoDSL provides to the customers in terms of high-quality services and lower cost, and service providers in terms of market growth and success. It also offers a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding Internet traffic streams: dragonflies and tortoises

    Publication Year: 2002, Page(s):110 - 117
    Cited by:  Papers (135)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2383 KB) | HTML iconHTML

    We present the concept of network traffic streams and the ways they aggregate into flows through Internet links. We describe a method of measuring the size and lifetime of Internet streams, and use this method to characterize traffic distributions at two different sites. We find that although most streams (about 45 percent of them) are dragonflies, lasting less than 2 seconds, a significant number... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network intrusion and fault detection: a statistical anomaly approach

    Publication Year: 2002, Page(s):76 - 82
    Cited by:  Papers (71)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1063 KB) | HTML iconHTML

    With the advent and explosive growth of the global Internet and electronic commerce environments, adaptive/automatic network/service intrusion and anomaly detection in wide area data networks and e-commerce infrastructures is fast gaining critical research and practical importance. We present and demonstrate the use of a general-purpose hierarchical multitier multiwindow statistical anomaly detect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Expanding the wireless universe: EU research on the move

    Publication Year: 2002, Page(s):132 - 140
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1638 KB) | HTML iconHTML

    This article provides an overview of the activities currently carried out under the IST research program of the European Commission, in the area of mobile and wireless communications and satellite systems. The research orientations specific to wireless communications are described in detail, with reference to the projects active in each area, defining a possible roadmap for the evolution of mobile... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Defending against flooding-based distributed denial-of-service attacks: a tutorial

    Publication Year: 2002, Page(s):42 - 51
    Cited by:  Papers (153)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1940 KB) | HTML iconHTML

    Flooding-based distributed denial-of-service (DDoS) attack presents a very serious threat to the stability of the Internet. In a typical DDoS attack, a large number of compromised hosts are amassed to send useless packets to jam a victim, or its Internet connection, or both. In the last two years, it was discovered that DDoS attack methods and tools are becoming more sophisticated, effective, and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Local loop unbundling in the Italian network

    Publication Year: 2002, Page(s):86 - 93
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (979 KB) | HTML iconHTML

    Unbundling consists of the possibility for a new operator to have special access to an incumbent's network infrastructure in order to provide value-added services without the necessity to duplicate the infrastructure itself. Local loop unbundling has received the most attention in Europe and in Italy. Most Italian operators are interested mainly in physical access to copper loop, which gives the o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing the Internet routing infrastructure

    Publication Year: 2002, Page(s):60 - 68
    Cited by:  Papers (23)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1266 KB) | HTML iconHTML

    The unprecedented growth of the Internet over the last years, and the expectation of an even faster increase in the numbers of users and networked systems, resulted in the Internet assuming its position as a mass communication medium. At the same time, the emergence of an increasingly large number of application areas and the evolution of the networking technology suggest that in the near future t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic spectrum management for next-generation DSL systems

    Publication Year: 2002, Page(s):101 - 109
    Cited by:  Papers (103)  |  Patents (32)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1346 KB) | HTML iconHTML

    The performance of DSL systems is severely constrained by crosstalk due to the electromagnetic coupling among the multiple twisted pairs making up a phone cable. In order to reduce performance loss arising from crosstalk, DSL systems are currently designed under the assumption of worst-case crosstalk scenarios leading to overly conservative DSL deployments. This article presents a new paradigm for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing security in wireless ad hoc networks

    Publication Year: 2002, Page(s):70 - 75
    Cited by:  Papers (237)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (840 KB) | HTML iconHTML

    A mobile ad hoc network consists of a collection of wireless mobile nodes that are capable of communicating with each other without the use of a network infrastructure or any centralized administration. MANET is an emerging research area with practical applications. However, wireless MANET is particularly vulnerable due to its fundamental characteristics, such as open medium, dynamic topology, dis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Communications Magazine, considered by most to be their most important member benefit, provides timely information on all aspects of communications: monthly feature articles describe technology, systems, services, market trends, development methods, regulatory and policy issues, and significant global events.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Osman Gebizlioglu
Huawei Technologies