By Topic

Potentials, IEEE

Issue 4 • Date Oct.-Nov. 2005

Filter Results

Displaying Results 1 - 19 of 19
  • Network devices: is more expensive better?

    Page(s): 32 - 34
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1708 KB)  

    Network devices are fundamental items in computer network design. The selection of the best device must be in terms of price to performance ratio since there is a budget limit to build a computer network. In this paper, we compare the packet loss rate (PLR), throughput and jitter of switches from different vendors and with different prices. A standard methodology is implemented to evaluate these parameters and final comparisons are made. Packet size and transmission rates followed the recommendations of RFC2544 for full duplex Ethernet 100BaseTX. The difference in cost between layer-2 switches must be related to administrative features, number/type of ports, supported layer-2 protocols and head-of-line blocking. It is observed that the best layer-2 switch is not necessarily the most expensive one and depending on the administrative features needed for each network, less expensive model can be used and obtain the same result. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Low-cost, fault-tolerance applications

    Page(s): 35 - 39
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2556 KB)  

    This article describes an approach for designing various low-cost, fault-tolerant uniprocessor applications using a multiprocessor. The proposed software-based fault-tolerant model is an economic and effective solution towards tolerating transients and intermittent faults that may occur during the run time of a multiprocessor application system. In this article, the proposed technique adopts the strategy of defensive programming based on time redundancy. This article focuses on protecting an application from faults by running multiple copies of the application on a shared-memory multiprocessor. It saves the costs of developing various independent versions of an application program. This is a significant step towards designing a reliable system at a low cost. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining the (data) bank

    Page(s): 40 - 42
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1419 KB) |  | HTML iconHTML  

    Data mining is the process of discovering meaningful new correlations, patterns, and trends by sifting through large amounts of data stored in repositories, using pattern recognition as well as statistical and mathematical techniques. Many tasks can be accomplished with data mining: classification, forecasting, clustering, deviation detection, description, visualization, and link analysis. In this article the unsupervised method was used. The analysis was done by different methods such as windowing, time series, and clustering, which were subsets of the segmentation family. A pattern can be a complicated nonlinear relationship between two variables. Each data-mining technique that could detect this pattern was named as the pattern recognition method. To discover knowledge from raw data, the analyzer program used mathematical functions such as mean, sum, smooth, and normalizes. To attain a more profitable program, the computer program was designed to be applicable to other similar data banks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The history of RFID

    Page(s): 8 - 11
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (684 KB)  

    Radio frequency identification (RFID) is an integral part of our life, which increases productivity and convenience. It is the term coined for short-range radio technology used to communicate mainly digital information between a stationary location and a movable object or between movable objects. This RFID system uses the principle of modulated backscatter where it can transfer the data from the tag to the reader. The tag generally reads its internal memory of stored data and changes the loading on the tag antenna in a coded manner corresponding to the stored data. RFID is a technology, which spans systems engineering, software development, encryption etc., and thus there are many engineers involved in the development and application of RFID and at present the shortage of technical and business people trained in RFID is hampering the growth of the industry. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bridging the generation gap

    Page(s): 17 - 20
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1060 KB)  

    The demand for mobile service increase many service providers which they start finding solutions for integrating third and fourth generation networks and to develop mobility protocols. This article introduces the macromobility, micromobility, and ad hoc routing protocols the Internet Engineering Task Force (IETF) has discussed. The aim is to familiarize readers with various mobility protocols, point out differences, and generate interest to pursue research. Cellular IP can perform handoffs in a number of ways, and it uses an efficient paging technique. To achieve this, it uses two mappings: paging cache (PC) and routing cache (RC). PCs are used only to search for (mobile node) MNs while RCs are used to route data to the MNs. Micromobility protocols complement MIP by reducing signaling overheads and enabling faster handoffs for seamless connectivity. These protocols handle local movements of MN without any interaction with MIP. It reduces the bandwidth consumption and another advantage of reducing signaling overheads is that it helps to conserve the power reserves of MNs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deploy XML-based network management approach

    Page(s): 26 - 31
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3872 KB)  

    The trend of Internet-working applications has created a demand for a more decentralized yet dynamic approach to the network and distribution systems. To deploy an XML-based network, with its core technologies, presents an effective solution to the network and distribution systems management task. While SNMP falls short in meeting the challenges and the dynamic changes on the network, XML-based technologies are evolved and new network architecture can be implemented to provide the means of effective management of pervasive distribution systems. The SOA model demonstrates the effective utilization of the XML-based approach in implementing and managing dynamic e-business solutions. Thus XML technologies offer advantages of easy-to-use complex data, promising configuration and compatibility. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RAB student activities committee

    Page(s): 2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (38 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating multimedia networking mechanisms using video traces

    Page(s): 21 - 25
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (809 KB)  

    The networked multimedia application, which has the increasing popularity of video data, is expected to account for a large portion of the traffic in the Internet of the future and in next-generation wireless systems. This article introduces video traces which gives the sizes of the individual video frames in a video sequence and also outlines how they characterize encoded video and can be used in evaluating multimedia networking mechanisms. One advantage of the video bit stream is that it allows for networking experiments where the quality of the video can be visually evaluated. Thus with the steady-state simulation approach, a single simulation run is performed and the metrics of interest are typically obtained during independent observation periods. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The present and future of broadband communications

    Page(s): 12 - 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1404 KB)  

    This paper describes broadband communications, which has the ability to transmit data in the wide band of frequencies. It also supplies multiple channels of data in single communications platform using some form of wave or frequency division multiplexing. Nowadays cable broadband network plays a major role in the present life by connecting more people in times of crisis and thus it creates more jobs and boost the economy significantly. Distance learning applications are being used to teach students by online courses using broadband communication systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Native command queuing - advanced performance in desktop storage

    Page(s): 4 - 7
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (976 KB) |  | HTML iconHTML  

    This paper describes a new key feature of SATA standard, native command queuing (NCQ). This feature is specific to the SATA interface but is similar in some ways to other reordering protocols developed for the small computer system interface (SCSI). Building a queue is the first component of this protocol. The drive must know when it receives a command whether it should queue the command or whether it should execute that command immediately. NCQ uses a new command protocol with new command opcodes that allows the device to know whether a command can be queued. Thus NCQ is more beneficial to the home PC environment, providing the storage subsystem with better performance for today's end-user requirements as media accessibility and the use of multiple applications simultaneously becomes a more commonplace event in the digital home. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Editorial

    Page(s): 3
    Save to Project icon | Request Permissions | PDF file iconPDF (36 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Potentials - Front cover

    Page(s): 0_1
    Save to Project icon | Request Permissions | PDF file iconPDF (1983 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (186 KB)  
    Freely Available from IEEE
  • 2006 IEEE membership application

    Page(s): 43 - 44
    Save to Project icon | Request Permissions | PDF file iconPDF (94 KB)  
    Freely Available from IEEE
  • Gamesman solutions

    Page(s): 45
    Save to Project icon | Request Permissions | PDF file iconPDF (68 KB)  
    Freely Available from IEEE
  • IEEE student membership delivers

    Page(s): 46
    Save to Project icon | Request Permissions | PDF file iconPDF (172 KB)  
    Freely Available from IEEE
  • Gamesman problems

    Page(s): 48
    Save to Project icon | Request Permissions | PDF file iconPDF (42 KB)  
    Freely Available from IEEE
  • [Back cover]

    Page(s): 50
    Save to Project icon | Request Permissions | PDF file iconPDF (654 KB)  
    Freely Available from IEEE

Aims & Scope

IEEE Potentials is the magazine dedicated to undergraduate and graduate students and young professionals.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Elizabeth T.B. Johnston
Design Alaska, Inc.