By Topic

Network, IEEE

Issue 3 • Date May-June 2004

Filter Results

Displaying Results 1 - 22 of 22
  • Optical Network Control, Architecture, Protocols, and Standards [Book Review]

    Page(s): 4
    Save to Project icon | Request Permissions | PDF file iconPDF (1299 KB)  
    Freely Available from IEEE
  • Implementing CIFS: The Common Internet File System [Book Review]

    Page(s): 4
    Save to Project icon | Request Permissions | PDF file iconPDF (1299 KB)  
    Freely Available from IEEE
  • Full text access may be available. Click article title to sign in or learn about subscription options.
  • How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN [Book Review]

    Page(s): 4 - 5
    Save to Project icon | Request Permissions | PDF file iconPDF (1382 KB)  
    Freely Available from IEEE
  • Introduction to WLLs [Book Review]

    Page(s): 5
    Save to Project icon | Request Permissions | PDF file iconPDF (1302 KB)  
    Freely Available from IEEE
  • Developing applications for Internet telephony: a case study on the use of parlay call control APIs in SIP networks

    Page(s): 48 - 55
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1758 KB) |  | HTML iconHTML  

    Applications offered to end users as value-added services, or more simple, services, are crucial for the survival and success of service providers. Two main sets of standards have emerged for Internet telephony: H.323 from the ITU-T and SIP from the IETF. Unfortunately, the related application development frameworks are rather weak. Parlay, a set of standard object-oriented and signaling protocol-neural APIs, is an alternative. It allows applications to access network functionality, including call control, in a controller manner. Call control makes it possible to establish, modify, and tear down calls. It is the main functionality offered by Internet telephony networks. We have built a call control application in a SIP environment, using the call control APIs offered by Parlay. The application is a multiparty game. This article describes the case study. The mapping of the APIs onto SIP is presented, and its implementation is described. Related work reviewed, and the lessons learned are discussed. Parlay call control APIs are suitable for application development in Internet telephony. However, well isolated extensions are needed to realize their full potential. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network Systems Design Using Network Processors [Book Review]

    Page(s): 5
    Save to Project icon | Request Permissions | PDF file iconPDF (1302 KB)  
    Freely Available from IEEE
  • Malware, Fighting Malicious Code [Book Review]

    Page(s): 6
    Save to Project icon | Request Permissions | PDF file iconPDF (1313 KB)  
    Freely Available from IEEE
  • Site-based mapping for parallel proxy servers with fewer TCP connections

    Page(s): 42 - 47
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1542 KB) |  | HTML iconHTML  

    Many mapping schemes for parallel proxy servers have been proposed in previous research. The operations of these schemes are mainly URL-based, and therefore cannot fully benefit from the new persistent connection feature of HTTP/1.1. In this article we propose a site-based mapping scheme that forwards all requests targeting the same Web site to the same proxy server. This allows a proxy to leave the TCP connections open between consecutive operations so as to avoid the costs of multiple open and close connections to the remote servers. Simulation results show that the proposed site-based scheme reduces 40-70 percent of connection setups and teardowns compared to conventional URL-based mapping schemes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A classification of reliable multicast protocols

    Page(s): 24 - 34
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2043 KB) |  | HTML iconHTML  

    The range of user requirements on multicast protocols is so wide that no single protocol will ever satisfy them. The set of multicast protocols can be classified using the user requirements, and the architectures, mechanisms, communications patterns, and policies used to satisfy these requirements. We provide such a classification, and illustrate it with several example protocols chosen to cover the range of features described. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Full text access may be available. Click article title to sign in or learn about subscription options.
  • IP-Bosed Next-Generotion Wireless Networks [Book Review]

    Page(s): 5 - 6
    Save to Project icon | Request Permissions | PDF file iconPDF (1396 KB)  
    Freely Available from IEEE
  • The IEEE 802.17 media access protocol for high-speed metropolitan-area resilient packet rings

    Page(s): 8 - 15
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1772 KB) |  | HTML iconHTML  

    The resilient packet ring (RPR) IEEE 802.17 standards is under development as a new high-speed technology for metropolitan backbone networks. A key performance objective of PRP is to simultaneously achieve high utilization, spatial reuse, and fairness, an objective not achieved by current technologies such as SONET and Gigabit Ethernet or legacy ring technologies, such as FDDI. The core technical challenge for RPR is the design of a fairness algorithm that dynamically throttles traffic to achieve these properties. The difficulty is in the distributed nature of the problem, that upstream ring nodes must inject traffic at a rate according to congestion and fairness criteria downstream. This article provides an overview of the RPR protocol with a focus on medium access and fairness. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optical burst switching: a new area in optical networking research

    Page(s): 16 - 23
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1804 KB) |  | HTML iconHTML  

    In this tutorial, we give an introduction to optical burst switching and compare it with other existing optical switching paradigms. Basic burst assembly algorithms and their effect on assembled burst traffic characteristics are described first. Then a brief review of the early work on burst transmission is provided, followed by a description of a prevailing protocol for OBS networks called just-enough-time (JET). Algorithms used as an OBS core node for burst scheduling as well as contention resolution strategies are presented next. Trade-offs between their performance and implementation complexities are discussed. Recent work on QoS support, IP/WDM multicast, TCP performance in OBS networks, and labeled OBS is also described, and several open issues are mentioned. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Failure protection in layered networks with shared risk link groups

    Page(s): 36 - 41
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1651 KB) |  | HTML iconHTML  

    The shared risk link group (SRLG) has been widely recognized as a fundamental concept in layered network design by the industry. However, several issues related to SRLG protections that are of both theoretical interest and practical importance have not been explored fully. Two major issues are avoiding failures caused by "traps" in finding backup paths, and minimizing the total network capacity requested by active and backup paths. In this article, we highlight the significance of the trap problem in layered networks with SRLG and evaluate the performance of several existing SRLG protection schemes in terms of trap avoidance and bandwidth efficiency, as well as their complexities. We also demonstrate that a simple yet intelligent heuristic algorithm can achieve good performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Network

    Page(s): 0_1
    Save to Project icon | Request Permissions | PDF file iconPDF (645 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (91 KB)  
    Freely Available from IEEE
  • IEEE Network Special Issue Wireless Local Area Networking: QoS Provision and Resource Management - Call for papers

    Page(s): 3
    Save to Project icon | Request Permissions | PDF file iconPDF (67 KB)  
    Freely Available from IEEE
  • IEEE Communications Magazine Multiple Access Technologies for B3G Wireless Communications - Call for papers

    Page(s): 35
    Save to Project icon | Request Permissions | PDF file iconPDF (74 KB)  
    Freely Available from IEEE
  • IEEE Communications Magazine announcement of a new series on Adhoc and Sensor Networks - First call for paper

    Page(s): 55
    Save to Project icon | Request Permissions | PDF file iconPDF (91 KB)  
    Freely Available from IEEE
  • IEEE Communications Magazine Entertainment Everywhere: System and Networking Issues in Emerging Network-Centric Entertainment Systems - Call for papers

    Page(s): 56
    Save to Project icon | Request Permissions | PDF file iconPDF (75 KB)  
    Freely Available from IEEE
  • 9th IFIP/IEEE International Symposium on Integrated Network Management - Call for papers

    Page(s): 57
    Save to Project icon | Request Permissions | PDF file iconPDF (151 KB)  
    Freely Available from IEEE

Aims & Scope

IEEE Network covers topics which include: network protocols and architecture; protocol design and validation; communications software; network control, signaling and management; network implementation (LAN, MAN, WAN); and micro-to-host communications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Xuemin (Sherman) Shen, PhD
Engineering University of Waterloo