By Topic

IEEE Journal on Selected Areas in Communications

Issue 10 • Date Dec. 2004

Filter Results

Displaying Results 1 - 25 of 27
  • Table of contents

    Publication Year: 2004, Page(s):c1 - c4
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • IEEE Journal on Selected Areas in Communications publication information

    Publication Year: 2004, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Guest Editorial Design, Implementation, and Analysis of Communication Protocols

    Publication Year: 2004, Page(s):1917 - 1919
    Request permission for commercial reuse | PDF file iconPDF (528 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multipath routing for video delivery over bandwidth-limited networks

    Publication Year: 2004, Page(s):1920 - 1932
    Cited by:  Papers (61)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB) | HTML iconHTML

    The delivery of quality video service often requires high bandwidth with low delay or cost in network transmission. Current routing protocols such as those used in the Internet are mainly based on the single-path approach (e.g., the shortest-path routing). This approach cannot meet the end-to-end bandwidth requirement when the video is streamed over bandwidth-limited networks. In order to overcome... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved BGP convergence via ghost flushing

    Publication Year: 2004, Page(s):1933 - 1948
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB) | HTML iconHTML

    Labovitz et al. (2001) and Labovitz et al. (2000) noticed that sometimes it takes border gateway protocol (BGP) a substantial amount of time and messages to converge and stabilize following the failure of some node in the Internet. In this paper, we suggest a minor modification to BGP that eliminates the problem pointed out and substantially reduces the convergence time and communication complexit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advertising interdomain QoS routing information

    Publication Year: 2004, Page(s):1949 - 1964
    Cited by:  Papers (24)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (792 KB) | HTML iconHTML

    To enable end-to-end quality-of-service (QoS) guarantees in the Internet, based on the border gateway protocol (BGP), interdomain QoS information advertising, and routing are important. However, little research has been done in this area so far. Two major challenges, scalability and heterogeneity, make the QoS extension to BGP difficult. In the existing routing schemes, static and instantaneous Qo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On designing self-tuning controllers for AQM routers supporting TCP flows based on pole placement

    Publication Year: 2004, Page(s):1965 - 1974
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    This paper revisits the simple pole placement technique in the classical control theory, and exploits this technique to propose two kinds of controllers for active queue management (AQM) in Internet protocol (IP) routers: the self-tuning proportional controller based on pole placement (ST_P_PP) and the self-tuning proportional-plus-integral controller based on pole placement (ST_PI&... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Leveraging single rate schemes in multiple rate multicast congestion control design

    Publication Year: 2004, Page(s):1975 - 1986
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB) | HTML iconHTML

    A significant impediment to deployment of multicast services is the daunting technical complexity of developing, testing and validating congestion control protocols fit for wide-area deployment. Protocols such as pragmatic general multicast congestion control (pgmcc) and TCP-friendly multicast congestion control (TFMCC) have recently made considerable progress on the single rate case, i.e., where ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving protocol capacity for UDP/TCP traffic with model-based frame scheduling in IEEE 802.11-operated WLANs

    Publication Year: 2004, Page(s):1987 - 2003
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (792 KB) | HTML iconHTML

    In this paper, we develop a model-based frame scheduling scheme, called MFS, to enhance the capacity of IEEE 802.11-operated wireless local area networks (WLANs) for both transmission control protocol (TCP) and user datagram protocol (UDP) traffic. In MFS each node estimates the current network status by keeping track of the number of collisions it encounters between its two consecutive successful... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A coordinated data collection approach: design, evaluation, and comparison

    Publication Year: 2004, Page(s):2004 - 2018
    Cited by:  Papers (9)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB) | HTML iconHTML

    We consider the problem of collecting a large amount of data from several different hosts to a single destination in a wide-area network. This problem is important since improvements in data collection times in many applications such as wide-area upload applications, high-performance computing applications, and data mining applications are crucial to performance of those applications. Often, due t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scalable model for interbandwidth broker resource reservation and provisioning

    Publication Year: 2004, Page(s):2019 - 2034
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1264 KB) | HTML iconHTML

    As the Internet evolves into global communication and commercial infrastructure, the need for quality-of-services (QoSs) in the Internet becomes more and more important. With a bandwidth broker (BB) support in each administrative domain, differentiated services (Diffserv) is seen as a key technology for achieving QoS guarantees in a scalable, efficient, and deployable manner in the Internet. In th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SeSFJava harness: service and assertion checking for protocol implementations

    Publication Year: 2004, Page(s):2035 - 2047
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB) | HTML iconHTML

    Many formal specification languages and associated tools have been developed for network protocols. Ultimately, formal language specifications have to be compiled into a conventional programming language and this involves manual intervention (even with automated tools). This manual work is often error prone because the programmer is not familiar with the formal language. So our goal is to verify a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for systematic evaluation of multicast congestion control protocols

    Publication Year: 2004, Page(s):2048 - 2061
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB) | HTML iconHTML

    Congestion control is a major requirement for multicast to be deployed in the current Internet. Due to the complexity and conflicting tradeoffs, the design and testing of multicast congestion control protocols is difficult. In this paper, we present a novel framework for systematic testing of multicast congestion control protocols. In our framework, we first design an appropriate model for the stu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interoperability test generation and minimization for communication protocols based on the multiple stimuli principle

    Publication Year: 2004, Page(s):2062 - 2074
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (792 KB) | HTML iconHTML

    This paper presents an automatic test generation and minimization method for testing interoperability of communication protocols such as the asynchronous transfer mode/broadband integrated services digital network (ATM/B-ISDN) signaling protocol and the transmission control protocol (TCP). The method is based on a technique of composing finite-state machines (FSMs). Traditionally, the generation o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol

    Publication Year: 2004, Page(s):2075 - 2086
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB) | HTML iconHTML

    We present a cryptographically sound security proof of the well-known Needham-Schroeder-Lowe public-key protocol for entity authentication. This protocol was previously only proved over unfounded abstractions from cryptography. We show that it is secure against arbitrary active attacks if it is implemented using standard provably secure cryptographic primitives. Nevertheless, our proof does not ha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An improved packet collision analysis for multi-Bluetooth piconets considering frequency-hopping guard time effect

    Publication Year: 2004, Page(s):2087 - 2094
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (672 KB) | HTML iconHTML

    Operating in the unlicensed 2.4-GHz ISM band, a Bluetooth piconet will inevitably encounter the interference problem from other piconets. With a special channel model and packet formats, one research issue is how to predict the packet collision effect in a multipiconet environment. In several earlier works, El-Hoiydi (2001), El-Hoiydi and Decotignie (2001), Lim et al. (2001), this problem is studi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of IEEE 802.11e contention-based channel access

    Publication Year: 2004, Page(s):2095 - 2106
    Cited by:  Papers (195)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB) | HTML iconHTML

    The new standard IEEE 802.11e is specified to support quality-of-service in wireless local area networks. A comprehensive study of the performance of enhanced distributed channel access (EDCA), the fundamental medium access control mechanism in IEEE 802.11e, is reported in this paper. We present our development of an analytical model, in which most new features of the EDCA such as virtual collisio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Communications Society Editorial Staff 2004

    Publication Year: 2004, Page(s):2107 - 2108
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • Call for papers on price-based access control and economics

    Publication Year: 2004, Page(s): 2109
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • Call for papers on ultra wideband wireless communications-theory and applications

    Publication Year: 2004, Page(s): 2110
    Request permission for commercial reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • Call for papers on power line communications

    Publication Year: 2004, Page(s): 2111
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Call for papers on advances in multicarrier CDMA

    Publication Year: 2004, Page(s): 2112
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • Call for papers on mobile routers and network mobility

    Publication Year: 2004, Page(s): 2113
    Request permission for commercial reuse | PDF file iconPDF (560 KB)
    Freely Available from IEEE
  • Call for papers on nonlinear optimization of communication systems

    Publication Year: 2004, Page(s): 2114
    Request permission for commercial reuse | PDF file iconPDF (153 KB)
    Freely Available from IEEE
  • 2004 Index

    Publication Year: 2004, Page(s):2115 - 2135
    Cited by:  Papers (2)
    Request permission for commercial reuse | PDF file iconPDF (203 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Journal on Selected Areas in Communications focuses on all telecommunications, including telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Muriel Médard
MIT