By Topic

IEEE/ACM Transactions on Networking

Issue 4 • Date Aug. 2004

Filter Results

Displaying Results 1 - 21 of 21
  • Table of contents

    Publication Year: 2004, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (471 KB)
    Freely Available from IEEE
  • IEEE/ACM Transactions on Networking publication information

    Publication Year: 2004, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • Terminating telephony services on the Internet

    Publication Year: 2004, Page(s):571 - 581
    Cited by:  Papers (11)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB) | HTML iconHTML

    We propose a general purpose service architecture for realizing services which start in the Public Switched Telephone Network (PSTN) but terminate and execute on the Internet. We discuss the needs for such services, our early research efforts in this direction which lead to prototyping certain benchmark services, and the current state of work in this area. We demonstrate the feasibility of the arc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resynchronization and controllability of bursty service requests

    Publication Year: 2004, Page(s):582 - 594
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (968 KB) | HTML iconHTML

    There is an increasing prevalence of interactive Web sessions in the Internet. These are mostly short-lived TCP connections that are delay-sensitive and have transfer times dominated by TCP backoffs, if any, during connection establishment. Unfortunately, arrivals of such connections at a server tend to be bursty, and can trigger multiple retransmissions, resulting in long average client-perceived... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Independent zone routing: an adaptive hybrid routing framework for ad hoc wireless networks

    Publication Year: 2004, Page(s):595 - 608
    Cited by:  Papers (84)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (672 KB) | HTML iconHTML

    To effectively support communication in such a dynamic networking environment as the ad hoc networks, the routing framework has to be adaptable to the spatial and temporal changes in the characteristics of the network, such as traffic and mobility patterns. Multiscoping, as is provided through the concept of the Zone Routing Protocol (ZRP) for example, can serve as a basis for such an adaptive beh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maximum lifetime routing in wireless sensor networks

    Publication Year: 2004, Page(s):609 - 619
    Cited by:  Papers (639)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB) | HTML iconHTML

    A routing problem in static wireless ad hoc networks is considered as it arises in a rapidly deployed, sensor based, monitoring system known as the wireless sensor network. Information obtained by the monitoring nodes needs to be routed to a set of designated gateway nodes. In these networks, every node is capable of sensing, data processing, and communication, and operates on its limited amount o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance aspects of data broadcast in wireless networks with user retrials

    Publication Year: 2004, Page(s):620 - 633
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1256 KB) | HTML iconHTML

    The user retrial phenomenon and its significant impact on network performance in unicast wireless systems are known and relatively well studied in the literature. However, there have been no previous studies on the impact of the user retrial phenomenon on other types of wireless networks. The objective of this paper is to extend the analysis of the user retrial phenomenon to wireless systems which... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ARC: the analytical rate control scheme for real-time traffic in wireless networks

    Publication Year: 2004, Page(s):634 - 644
    Cited by:  Papers (36)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB) | HTML iconHTML

    Next-generation wireless Internet (NGWI) is expected to provide a wide range of services including real-time multimedia to mobile users. However, the real-time multimedia traffic transport requires rate control deployment to protect shared Internet from unfairness and further congestion collapse. The transmission rate control method must also achieve high throughput and satisfy multimedia requirem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scheduling satellite-switched time-division multiple access with general switching modes

    Publication Year: 2004, Page(s):645 - 652
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    Based on network circulation formulation, the existence of feasible beam-to-beam switching modes for a satellite-switched time-division multiple access system is completely and transparently proved, where simultaneous transmissions on several carriers in each spot-beam are configured. Showing the linear independence of all but one augmented switching modes, a new bound of mn+2 is obtained on the n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scalable multicast key management scheme for heterogeneous wireless networks

    Publication Year: 2004, Page(s):653 - 666
    Cited by:  Papers (59)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (816 KB) | HTML iconHTML

    Secure multicast applications require key management that provides access control. In wireless networks, where the error rate is high and the bandwidth is limited, the design of key management schemes should place emphasis on reducing the communication burden associated with key updating. A communication-efficient class of key management schemes is those that employ a tree hierarchy. However, thes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Markov-chain modeling for multicast signaling delay analysis

    Publication Year: 2004, Page(s):667 - 680
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB) | HTML iconHTML

    Feedback signaling plays a key role in flow control because the traffic source relies on the signaling information to make correct and timely flow-control decisions. However, it is difficult to design an efficient signaling algorithm since a signaling message can tolerate neither error nor latency. Multicast flow-control signaling imposes two additional challenges: scalability and feedback synchro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tradeoffs between low complexity, low latency, and fairness with deficit round-robin schedulers

    Publication Year: 2004, Page(s):681 - 693
    Cited by:  Papers (30)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB) | HTML iconHTML

    Deficit Round-Robin (DRR) is a scheduling algorithm devised for providing fair queueing in the presence of variable length packets. The main attractive feature of DRR is its simplicity of implementation: in fact, it can exhibit O(1) complexity, provided that specific allocation constraints are met. However, according to the original DRR implementation, meeting such constraints often implies tolera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding CHOKe: throughput and spatial characteristics

    Publication Year: 2004, Page(s):694 - 707
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB) | HTML iconHTML

    A recently proposed active queue management, CHOKe, is stateless, simple to implement, yet surprisingly effective in protecting TCP from UDP flows. We present an equilibrium model of TCP/CHOKe. We prove that, provided the number of TCP flows is large, the UDP bandwidth share peaks at (e+1)-1=0.269 when UDP input rate is slightly larger than link capacity, and drops to zero as UDP input ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A method for estimating the proportion of nonresponsive traffic at a router

    Publication Year: 2004, Page(s):708 - 718
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (696 KB) | HTML iconHTML

    In this paper, a scheme for estimating the proportion of the incoming traffic that is not responsive to congestion at a router is presented. The idea of the proposed scheme is that if the observed queue length and packet drop probability do not match the predictions from a model of responsive (TCP) traffic, then the error must come from nonresponsive traffic; it can then be used for estimating the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and stability analysis of a rate control algorithm using the Routh-Hurwitz stability criterion

    Publication Year: 2004, Page(s):719 - 732
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (896 KB) | HTML iconHTML

    Feedback delays arise in the control of a computer network-from the information transfer process itself and from the processing of control signals at the network nodes. Flow control of data sources in a computer network often results in a time-delayed control problem. Feedback delay reduces the stability of a system. In this paper we discuss how to use the Routh-Hurwitz stability criterion to desi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New preemption policies for DiffServ-aware traffic engineering to minimize rerouting in MPLS networks

    Publication Year: 2004, Page(s):733 - 745
    Cited by:  Papers (31)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (856 KB) | HTML iconHTML

    The preemption policy currently in use in MPLS-enabled commercial routers selects LSPs for preemption based only on their priority and holding time. This can lead to waste of resources and excessive number of rerouting decisions. In this paper, a new preemption policy is proposed and complemented with an adaptive scheme that aims to minimize rerouting. The new policy combines the three main preemp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic allocation of resources to virtual path agents

    Publication Year: 2004, Page(s):746 - 758
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB) | HTML iconHTML

    One of the major problems faced in operating large networks is the enormous amount of processing and communications overhead required for setting up and tearing down the large number of connections maintained by the network. ATM and MPLS aim at solving these problems via the Virtual Path (VP) mechanism which is used to group together the connections. When a need for setting up a connection rises, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast simulation of wavelength continuous WDM networks

    Publication Year: 2004, Page(s):759 - 765
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    This paper considers the estimation of blocking probabilities of circuit-switched WDM networks with no wavelength converters and with fixed routing. It presents an importance sampling simulation technique for determining whether or not such a network meets a specific grade of service requirement, in the sense of all routes having blocking below a given threshold. It is especially efficient for net... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality without compromise [advertisement]

    Publication Year: 2004, Page(s): 766
    Request permission for commercial reuse | PDF file iconPDF (319 KB)
    Freely Available from IEEE
  • IEEE/ACM Transactions on Networking society information

    Publication Year: 2004, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • IEEE/ACM Transactions on Networking Information for authors

    Publication Year: 2004, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE/ACM Transactions on Networking’s high-level objective is to publish high-quality, original research results derived from theoretical or experimental exploration of the area of communication/computer networking.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
R. Srikant
Dept. of Electrical & Computer Engineering
Univ. of Illinois at Urbana-Champaign