By Topic

IEEE Communications Magazine

Issue 6 • June 1991

Filter Results

Displaying Results 1 - 5 of 5
  • Technologies on the horizon-voice vs. data: an estimate of future broadband traffic

    Publication Year: 1991
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB)

    A number of data and other services are examined, and the total digital traffic generated, compared to voice traffic in digital form, is estimated. The total yearly traffic generated by telephone calls is estimated. The total traffic in digital form is calculated for a number of data services involving terminals and the transmission of text in digital form as alphanumeric characters. Included are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trends in cellular and cordless communications

    Publication Year: 1991, Page(s):31 - 40
    Cited by:  Papers (187)  |  Patents (50)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1269 KB)

    The evolution of wireless information networks is traced from the present first generation systems to next century's third generation. The third generation is envisioned as a unified wireless access replacing the diverse and incompatible second-generation networks with a single means of wireless access to advanced information services. Four issues are examined: the goal a network is designed to ac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptographic identification methods for smart cards in the process of standardization

    Publication Year: 1991, Page(s):42 - 48
    Cited by:  Papers (7)  |  Patents (50)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (764 KB)

    Identification using integrated-circuit cards in credit card format with a built-in microcontroller (smart cards) is examined. The process by which the terminal's card adapter device verifies the authenticity of the smart card, called cryptographic node authentication, is examined. The methods used for node authentication, all of which are based on interrogation protocols, can be divided into the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SONET ring applications for survivable fiber loop networks

    Publication Year: 1991, Page(s):51 - 58
    Cited by:  Papers (20)  |  Patents (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1213 KB)

    Synchronous optical network (SONET) self-healing rings (SHR) are studied in the loop environment. SONET SHR architectures for loop feeder networks are discussed, focusing on three possible dual central office (CO) architectures for fiber loop networks, using SONET SHRs to reduce network costs and provide network service survivability. These architectures reflect an integrated planning concept for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OAM&P for ISDN basic access DSL based on ANSI physical layer standards

    Publication Year: 1991, Page(s):59 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (489 KB)

    The operations administration maintenance and provisioning (OAM&P) functions provided by the American National Standards Institute (ANSI) for the following standards are described: T1.601, a 2B1Q-based transmission system at the network side of the NT1; T1.605, the United States version of the International Consultative Committee for Telephone and Telegraph (CCITT) Rec. I.430; and T1.216, for mana... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Communications Magazine, considered by most to be their most important member benefit, provides timely information on all aspects of communications: monthly feature articles describe technology, systems, services, market trends, development methods, regulatory and policy issues, and significant global events.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Osman Gebizlioglu
Huawei Technologies