Scheduled System Maintenance on May 29th, 2015:
IEEE Xplore will be upgraded between 11:00 AM and 10:00 PM EDT. During this time there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

Network, IEEE

Issue 1 • Date Jan.-Feb. 2006

Filter Results

Displaying Results 1 - 10 of 10
  • IEEE Network Magazine

    Publication Year: 2006 , Page(s): 0_1
    Save to Project icon | Request Permissions | PDF file iconPDF (558 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2006 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (83 KB)  
    Freely Available from IEEE
  • Editor's note

    Publication Year: 2006 , Page(s): 2 - 3
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (463 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recovery of the control plane after failures in ASON/GMPLS networks

    Publication Year: 2006 , Page(s): 4 - 10
    Cited by:  Papers (24)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (127 KB) |  | HTML iconHTML  

    A reliable control plane plays a crucial role in creating high-level services in the next-generation transport network based on the generalized multiprotocol label switching (GMPLS) or automatically switched optical networks (ASON) model. Approaches to control-plane survivability, based on protection, and restoration mechanisms, are examined. Procedures for the control plane state recovery are discussed, including link and node failure recovery View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality of service for packet telephony over mobile ad hoc networks

    Publication Year: 2006 , Page(s): 12 - 20
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (171 KB) |  | HTML iconHTML  

    IP telephony over mobile ad hoc networks is a topic of emerging interest in the research arena as one of the paths toward the fixed-mobile convergence in telecommunications networks. To investigate the performance characteristics of this service, we propose a complete system architecture, which includes a MAC protocol, a routing protocol, and the treatment of voice packets. The telephone system is analyzed in the case of point-to-point calls inside the ad hoc network, and the end-to-end performance is assessed in terms of the percentage of blocked and dropped calls, packet loss and packet delay. The analysis takes into account network scalability by investigating how; the size of the multihop ad hoc network impacts the quality of service. Moreover, the synthetic mean opinion score of the telephone service is evaluated according to the ITU-T E-model View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Localized network layer protocols in wireless sensor networks based on optimizing cost over progress ratio

    Publication Year: 2006 , Page(s): 21 - 27
    Cited by:  Papers (25)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (126 KB) |  | HTML iconHTML  

    We present a simple framework for designing network layer protocols for sensor networks including localized routing, broadcasting, area coverage, and so on. The framework is general enough and is applicable to a variety of problems, network assumptions, and optimality criteria. Our simple framework is based on optimizing the ratio of the cost of making certain decisions (e.g., selecting a forwarding neighbor for routing) to the progress made in doing so (e.g., reduction in distance to destination). We show how to apply this general guideline for the design of hop count, power awareness, maximal lifetime, beaconless and physical-layer-based routing, minimal energy broadcasting, sensor area coverage, and multicasting protocols. Moreover, we show that in the case of routing, the best known strictly localized position-based techniques are, in almost all cases, special cases of the described general cost-to-progress ratio paradigm View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web cache replacement policies: a pragmatic approach

    Publication Year: 2006 , Page(s): 28 - 34
    Cited by:  Papers (10)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (116 KB) |  | HTML iconHTML  

    Research involving Web cache replacement policy has been active for at least a decade. In this-article we would like to claim that there is a sufficient number of good policies, and further proposals would only produce minute improvements. We argue that the focus should be fitness for purpose rather than proposing any new policies. Up to now, almost all policies were purported to perform better than others, creating confusion as to which policy should be used. Actually, a policy only performs well in certain environments. Therefore, the goal of this article is to identify the appropriate policies for proxies with different characteristics, such as proxies with a small cache, limited bandwidth, and limited processing power, as well as suggest policies for different types of proxies, such as ISP-level and root-level proxies View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Defining 4G technology from the users perspective

    Publication Year: 2006 , Page(s): 35 - 41
    Cited by:  Papers (43)  |  Patents (8)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (363 KB) |  | HTML iconHTML  

    The ever-increasing growth of user demand, the limitations of the third generation of wireless mobile communication systems, and the emergence of new mobile broadband technologies on the market have brought researchers and industries to a thorough reflection on the fourth generation. Many prophetic visions have appeared in the literature presenting 4G as the ultimate boundary of wireless mobile communication without any limit to its potential, but in practical terms not giving any design rules and thus any definition of it. In this article we give a pragmatic definition of 4G derived from a new user-centric methodology that considers the user as the "cornerstone" of the design. In this way, we devise fundamental user scenarios that implicitly reveal the key features of 4G, which are then expressed explicitly in a new framework - the "user-centric" system - that describes the various level of interdependency among them. This approach consequently contributes to the identification of the real technical step-up of 4G with respect to 3G. Finally, an example of a potential 4G application is also given in order to demonstrate the validity of the overall methodology View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Network Magazine reviewers / 2005

    Publication Year: 2006 , Page(s): 42 - 43
    Save to Project icon | Request Permissions | PDF file iconPDF (49 KB)  
    Freely Available from IEEE
  • 2005 index IEEE Network

    Publication Year: 2006 , Page(s): 44 - 48
    Save to Project icon | Request Permissions | PDF file iconPDF (341 KB)  
    Freely Available from IEEE

Aims & Scope

IEEE Network covers topics which include: network protocols and architecture; protocol design and validation; communications software; network control, signaling and management; network implementation (LAN, MAN, WAN); and micro-to-host communications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Xuemin (Sherman) Shen, PhD
Engineering University of Waterloo