By Topic

IEEE/ACM Transactions on Networking

Issue 1 • Date Feb. 2004

Filter Results

Displaying Results 1 - 21 of 21
  • [Front cover]

    Publication Year: 2004, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (149 KB)
    Freely Available from IEEE
  • IEEE Transactions on Networking publication information

    Publication Year: 2004, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Editorial

    Publication Year: 2004, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (20 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring ISP topologies with Rocketfuel

    Publication Year: 2004, Page(s):2 - 16
    Cited by:  Papers (397)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB) | HTML iconHTML

    To date, realistic ISP topologies have not been accessible to the research community, leaving work that depends on topology on an uncertain footing. In this paper, we present new Internet mapping techniques that have enabled us to measure router-level ISP topologies. Our techniques reduce the number of required traces compared to a brute-force, all-to-all approach by three orders of magnitude with... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing with topology aggregation in delay-bandwidth sensitive networks

    Publication Year: 2004, Page(s):17 - 29
    Cited by:  Papers (56)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB) | HTML iconHTML

    Routing is a process of finding a network path from a source node to a destination node. The execution time and the memory requirement of a routing algorithm increase with the size of the network. In order to deal with the scalability problem, large networks are often structured hierarchically by grouping nodes into different domains. The internal topology of each domain is then aggregated into a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Alternate path routing for multicast

    Publication Year: 2004, Page(s):30 - 43
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    Current network-layer multicast routing protocols build multicast trees based only on hop count and policy. If a tree cannot meet application requirements, the receivers have no alternative. In this paper, we propose a general and modular architecture that integrates alternate path routing with the network's multicast services. This enables individual multicast receivers to reroute a multicast tre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The STRESS method for boundary-point performance analysis of end-to-end multicast timer-suppression mechanisms

    Publication Year: 2004, Page(s):44 - 58
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    The advent of multicast and the growth and complexity of the Internet has complicated network protocol design and evaluation. Evaluation of Internet protocols usually uses random scenarios or scenarios based on designers' intuition. Such an approach may be useful for average case analysis but does not cover boundary-point (worst or best case) scenarios. To synthesize boundary-point scenarios, a mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Path selection methods with multiple constraints in service-guaranteed WDM networks

    Publication Year: 2004, Page(s):59 - 72
    Cited by:  Papers (44)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB) | HTML iconHTML

    We propose a new approach to constraint-based path selection for dynamic routing and wavelength allocation in optical networks based on WDM. Our approach considers service-specific path quality attributes, such as physical layer impairments, reliability, policy, and traffic conditions, and uses a flooding-based transfer of path information messages from source to destination to find multiple feasi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reconfiguration of spare capacity for MPLS-based recovery in the Internet backbone networks

    Publication Year: 2004, Page(s):73 - 84
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB) | HTML iconHTML

    This paper introduces a novel approach, called Short Leap Shared Protection with spare capacity Reallocation (SLSP-R), to deal with dynamic reconfiguration of spare capacity for MPLS-based recovery in the Internet backbone networks. SLSP-R is based on the SLSP framework and is designed to quantify the impact of computation complexity on network performance. The basic idea for SLSP-R is to subdivid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design, analysis, and implementation of DVSR: a fair high-performance protocol for packet rings

    Publication Year: 2004, Page(s):85 - 102
    Cited by:  Papers (56)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (672 KB) | HTML iconHTML

    The Resilient Packet Ring (RPR) IEEE 802.17 standard is a new technology for high-speed backbone metropolitan area networks. A key performance objective of RPR is to simultaneously achieve high utilization, spatial reuse, and fairness, an objective not achieved by current technologies such as SONET and Gigabit Ethernet nor by legacy ring technologies such as FDDI. The core technical challenge for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wide-band TD-CDMA MAC with minimum-power allocation and rate- and BER-scheduling for wireless multimedia networks

    Publication Year: 2004, Page(s):103 - 116
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB) | HTML iconHTML

    A wide-band time-division-code-division multiple-access (TD-CDMA) medium access control (MAC) protocol is introduced in this paper. A new minimum-power allocation algorithm is developed to minimize the interference experienced by a code channel such that heterogeneous bit-error rate (BER) requirements of multimedia traffic are satisfied. Further, from analysis of the maximum capacity of a time slo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concurrent search of mobile users in cellular networks

    Publication Year: 2004, Page(s):117 - 130
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    In this paper, we propose to concurrently search for a number of mobile users in a wireless cellular network based on the probabilistic information about the locations of mobile users. The concurrent search approach guarantees that all k mobile users will be located within k time slots. It is shown that even in the worst case when mobile users appear equally in all the cells of the network, the co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and performance evaluation of a cellular mobile network

    Publication Year: 2004, Page(s):131 - 145
    Cited by:  Papers (30)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB) | HTML iconHTML

    An analytic model of cellular mobile communications networks with instantaneous movement is investigated in this paper. This cellular mobile network is showed to be equivalent to a queueing network and furthermore the equilibrium distribution of this cellular mobile network is proved to have a product form. The explicit expressions for handoff rates of calls from one cell to another, the blocking ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A distributed database architecture for global roaming in next-generation mobile networks

    Publication Year: 2004, Page(s):146 - 160
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB) | HTML iconHTML

    The next-generation mobile network will support terminal mobility, personal mobility, and service provider portability, making global roaming seamless. A location-independent personal telecommunication number (PTN) scheme is conducive to implementing such a global mobile system. However, the nongeographic PTNs coupled with the anticipated large number of mobile users in future mobile networks may ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A predictive flow control scheme for efficient network utilization and QoS

    Publication Year: 2004, Page(s):161 - 172
    Cited by:  Papers (11)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    In this paper, we develop a new predictive flow control scheme and analyze its performance. This scheme controls the nonreal-time (controllable) traffic based on predicting the real-time (uncontrollable) traffic. The goal of the work is to operate the network in a low congestion, high throughput regime. We provide a rigorous analysis of the performance of our flow control method and show that the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network border patrol: preventing congestion collapse and promoting fairness in the Internet

    Publication Year: 2004, Page(s):173 - 186
    Cited by:  Papers (17)  |  Patents (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB) | HTML iconHTML

    The Internet's excellent scalability and robustness result in part from the end-to-end nature of Internet congestion control. End-to-end congestion control algorithms alone, however, are unable to prevent the congestion collapse and unfairness created by applications that are unresponsive to network congestion. To address these maladies, we propose and investigate a novel congestion-avoidance mech... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis for hierarchical multirate loss networks

    Publication Year: 2004, Page(s):187 - 199
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB) | HTML iconHTML

    The reduced load approximation technique has been extensively applied to flat networks, but the feasibility of applying it to hierarchical network model has seldom been described. Hierarchical routing is essential for large networks such as the Internet inter/intra-domain routing hierarchy and the Private Network to Node Interface (PNNI) standard. Therefore, this paper proposes an efficient and ac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • List of Reviewers

    Publication Year: 2004, Page(s):200 - 202
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • IEEE copyright form

    Publication Year: 2004, Page(s):203 - 204
    Request permission for commercial reuse | PDF file iconPDF (1057 KB)
    Freely Available from IEEE
  • IEEE Transactions on Networking society information

    Publication Year: 2004, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • IEEE Transactions on Networking information for authors

    Publication Year: 2004, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE/ACM Transactions on Networking’s high-level objective is to publish high-quality, original research results derived from theoretical or experimental exploration of the area of communication/computer networking.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
R. Srikant
Dept. of Electrical & Computer Engineering
Univ. of Illinois at Urbana-Champaign