By Topic

IEEE Journal on Selected Areas in Communications

Issue 3 • Date March 2005

Filter Results

Displaying Results 1 - 25 of 27
  • Table of contents

    Publication Year: 2005, Page(s):c1 - c4
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • IEEE Journal on Selected Areas in Communications publication information

    Publication Year: 2005, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Guest Editorial Wireless Ad Hoc Networks—Part II

    Publication Year: 2005, Page(s):481 - 485
    Cited by:  Papers (2)
    Request permission for commercial reuse | PDF file iconPDF (816 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulcast packet transmission in ad hoc networks

    Publication Year: 2005, Page(s):486 - 495
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB) | HTML iconHTML

    In previous work, unequal error-protection techniques have been applied to improve the throughput of a wireless communication system in which a transmission is received by several radios with different capabilities. For instance, these capabilities may correspond to differences in path loss, fading, or interference. By taking advantage of the broadcast nature of the channel, additional messages fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ad hoc networking with directional antennas: a complete system solution

    Publication Year: 2005, Page(s):496 - 506
    Cited by:  Papers (217)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (808 KB) | HTML iconHTML

    Directional antennas offer tremendous potential for improving the performance of ad hoc networks. Harnessing this potential, however, requires new mechanisms at the medium access and network layers for intelligently and adaptively exploiting the antenna system. While recent years have seen a surge of research into such mechanisms, the problem of developing a complete ad hoc networking system, incl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PACMAN: passive autoconfiguration for mobile ad hoc networks

    Publication Year: 2005, Page(s):507 - 519
    Cited by:  Papers (72)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (800 KB) | HTML iconHTML

    Mobile ad hoc networks (MANETs) enable the communication between mobile nodes via multihop wireless routes without depending on a communication infrastructure. In contrast to infrastructure-based networks, MANET's support autonomous and spontaneous networking and, thus, should be capable of self-organization and -configuration. This paper presents passive autoconfiguration for mobile ad hoc networ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the interdependence of distributed topology control and geographical routing in ad hoc and sensor networks

    Publication Year: 2005, Page(s):520 - 532
    Cited by:  Papers (63)  |  Patents (40)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (800 KB) | HTML iconHTML

    Since ad hoc and sensor networks can be composed of a very large number of devices, the scalability of network protocols is a major design concern. Furthermore, network protocols must be designed to prolong the battery lifetime of the devices. However, most existing routing techniques for ad hoc networks are known not to scale well. On the other hand, the so-called geographical routing algorithms ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On-demand loop-free routing with link vectors

    Publication Year: 2005, Page(s):533 - 546
    Cited by:  Papers (4)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB) | HTML iconHTML

    We present the on-demand link vector (OLIVE) protocol, a routing protocol for ad hoc networks based on link-state information that is free of routing loops and supports destination-based packet forwarding. Routers exchange routing information reactively for each destination in the form of complete paths, and each node creates a labeled source graph based on the paths advertised by its neighbors. A... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The impact of traffic patterns on the overhead of reactive routing protocols

    Publication Year: 2005, Page(s):547 - 560
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (696 KB) | HTML iconHTML

    This paper presents a mathematical and simulative framework for quantifying the overhead of reactive routing protocols, such as dynamic source routing and ad hoc on-demand distance vector, in wireless variable topology (ad hoc) networks. A model of the routing-layer traffic, in terms of the statistical description of the distance between a source and a destination, is presented. The model is used ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS-aware routing based on bandwidth estimation for mobile ad hoc networks

    Publication Year: 2005, Page(s):561 - 572
    Cited by:  Papers (195)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB) | HTML iconHTML

    Routing protocols for mobile ad hoc networks (MANETs) have been explored extensively in recent years. Much of this work is targeted at finding a feasible route from a source to a destination without considering current network traffic or application requirements. Therefore, the network may easily become overloaded with too much traffic and the application has no way to improve its performance unde... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS assurances through class selection and proportional differentiation in wireless networks

    Publication Year: 2005, Page(s):573 - 584
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (768 KB) | HTML iconHTML

    Quality-of-service (QoS) in wireless ad hoc networks is adversely affected by node mobility, changing network topologies, and uncontrolled medium contention. The paper addresses the challenges in concurrently providing a wide range of end-to-end throughput and delay assurances in such networks. The proposed solution is based on the neighborhood proportional delay differentiation (NPDD) service mod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A topology-independent wireless fair queueing model in ad hoc networks

    Publication Year: 2005, Page(s):585 - 597
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB) | HTML iconHTML

    Fair queueing of rate and delay-sensitive packet flows in a shared-medium, multihop wireless network is challenging due to the unique design issues. These issues include: 1) spatial contention among transmitting flows in a spatial locality, as well as spatial reuse of bandwidth through concurrent flow transmissions in different network locations; 2) conflicts between ensuring fairness and maximizi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authenticated routing for ad hoc networks

    Publication Year: 2005, Page(s):598 - 610
    Cited by:  Papers (116)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB) | HTML iconHTML

    Initial work in ad hoc routing has considered only the problem of providing efficient mechanisms for finding paths in very dynamic networks, without considering security. Because of this, there are a number of attacks that can be used to manipulate the routing in an ad hoc network. In this paper, we describe these threats, specifically showing their effects on ad hoc on-demand distance vector and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient key predistribution scheme for ad hoc network security

    Publication Year: 2005, Page(s):611 - 621
    Cited by:  Papers (45)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB) | HTML iconHTML

    We introduce hashed random preloaded subsets (HARPS), a highly scalable key predistribution (KPD) scheme employing only symmetric cryptographic primitives. HARPS is ideally suited for resource constrained nodes that need to operate for extended periods without active involvement of a trusted authority (TA), as is usually the case for nodes forming ad hoc networks (AHNs). HARPS, a probabilistic KPD... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-world environment models for mobile network evaluation

    Publication Year: 2005, Page(s):622 - 632
    Cited by:  Papers (75)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB) | HTML iconHTML

    Simulation environments are an important tool for the evaluation of new concepts in networking. The study of mobile ad hoc networks depends on understanding protocols from simulations, before these protocols are implemented in a real-world setting. To produce a real-world environment within which an ad hoc network can be formed among a set of nodes, there is a need for the development of realistic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed topology construction of Bluetooth wireless personal area networks

    Publication Year: 2005, Page(s):633 - 643
    Cited by:  Papers (29)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB) | HTML iconHTML

    Bluetooth, a wireless technology based on a frequency-hopping physical layer, enables portable devices to form short-range wireless ad hoc networks. Bluetooth hosts are not able to communicate unless they have previously discovered each other through synchronization of their timing and frequency-hopping patterns. Thus, even if all nodes are within proximity of each other, only those nodes which ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Can Bluetooth succeed as a large-scale ad hoc networking technology?

    Publication Year: 2005, Page(s):644 - 656
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB) | HTML iconHTML

    We investigate issues that Bluetooth may face in evolving from a simple wire replacement to a large-scale ad hoc networking technology. We do so by examining the efficacy of Bluetooth in establishing a connected topology, which is a basic requirement of any networking technology. We demonstrate that Bluetooth experiences some fundamental algorithmic challenges in accomplishing this seemingly simpl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Capacity of ad hoc wireless networks with infrastructure support

    Publication Year: 2005, Page(s):657 - 667
    Cited by:  Papers (131)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB) | HTML iconHTML

    We determine the asymptotic scaling for the per user throughput in a large hybrid ad hoc network, i.e., a network with both ad hoc nodes, which communicate with each other via shared wireless links of capacity W bits/s, and infrastructure nodes which in addition are interconnected with each other via high capacity links. Specifically, we consider a network model where ad hoc nodes are randomly spa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Congestion-based routing strategies in multihop TDD-CDMA networks

    Publication Year: 2005, Page(s):668 - 681
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB) | HTML iconHTML

    In this paper, a network topology is investigated that allows both peer-to-peer and nonlocal traffic in a cellular-based time-division duplex code-division multiple-access (TDD-CDMA) system known as opportunity driven multiple access (ODMA). The key to offering appropriate performance of peer-to-peer communication in such a system relies on the use of a routing algorithm which minimizes interferen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call for papers on advances in multicarrier CDMA

    Publication Year: 2005, Page(s): 682
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • Call for papers on mobile routers and network mobility

    Publication Year: 2005, Page(s): 683
    Request permission for commercial reuse | PDF file iconPDF (560 KB)
    Freely Available from IEEE
  • Call for papers on high-speed network security - architecture, algorithms and implementation

    Publication Year: 2005, Page(s): 684
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • Call for papers on nonlinear optimization of communication systems

    Publication Year: 2005, Page(s): 685
    Request permission for commercial reuse | PDF file iconPDF (153 KB)
    Freely Available from IEEE
  • Call for papers on multi-hop wireless mesh networks

    Publication Year: 2005, Page(s): 686
    Request permission for commercial reuse | PDF file iconPDF (531 KB)
    Freely Available from IEEE
  • IEEE order form for reprints

    Publication Year: 2005, Page(s): 687
    Request permission for commercial reuse | PDF file iconPDF (378 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Journal on Selected Areas in Communications focuses on all telecommunications, including telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Muriel Médard
MIT