Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

IEEE/ACM Transactions on Networking

Issue 4 • Aug. 2006

Filter Results

Displaying Results 1 - 25 of 26
  • Table of contents

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (418 KB)
    Freely Available from IEEE
  • IEEE/ACM Transactions on Networking publication information

    Publication Year: 2006, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Editorial

    Publication Year: 2006, Page(s): 673
    Request permission for commercial reuse | PDF file iconPDF (17 KB) | HTML iconHTML
    Freely Available from IEEE
  • Introduction to the Special Issue on Networking and Information Theory

    Publication Year: 2006, Page(s): 674
    Request permission for commercial reuse | PDF file iconPDF (25 KB) | HTML iconHTML
    Freely Available from IEEE
  • On the$theta$-Coverage and Connectivity of Large Random Networks

    Publication Year: 2006, Page(s):675 - 682
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (159 KB)

    Wireless planar networks have been used to model wireless networks in a tradition that dates back to 1961 to the work of E. N. Gilbert. Indeed the study of connected components in wireless networks was the motivation for his pioneering work that spawned the modern field of continuum percolation theory. Given that node locations in wireless networks are not known, random planar modeling can be used... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Low-rate TCP-targeted denial of service attacks and counter strategies

    Publication Year: 2006, Page(s):683 - 696
    Cited by:  Papers (71)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (562 KB) | HTML iconHTML

    Denial of Service attacks are presenting an increasing threat to the global inter-networking infrastructure. While TCP's congestion control algorithm is highly robust to diverse network conditions, its implicit assumption of end-system cooperation results in a well-known vulnerability to attack by high-rate non-responsive flows. In this paper, we investigate a class of low-rate denial of service a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network loss tomography using striped unicast probes

    Publication Year: 2006, Page(s):697 - 710
    Cited by:  Papers (32)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (777 KB) | HTML iconHTML

    In this paper, we explore the use of end-to-end unicast traffic as measurement probes to infer link-level loss rates. We leverage off of earlier work that produced efficient estimates for link-level loss rates based on end-to-end multicast traffic measurements. We design experiments based on the notion of transmitting stripes of packets (with no delay between transmission of successive packets wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The traveling miser problem

    Publication Year: 2006, Page(s):711 - 724
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (954 KB) | HTML iconHTML

    Various monitoring and performance evaluation tools generate considerable amount of low priority traffic. This information is not always needed in real time and often can be delayed by the network without hurting functionality. This paper proposes a new framework to handle this low priority, but resource consuming traffic in such a way that it incurs a minimal interference with the higher priority... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On selfish routing in Internet-like environments

    Publication Year: 2006, Page(s):725 - 738
    Cited by:  Papers (52)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1205 KB) | HTML iconHTML

    A recent trend in routing research is to avoid inefficiencies in network-level routing by allowing hosts to either choose routes themselves (e.g., source routing) or use overlay routing networks (e.g., Detour or RON). Such approaches result in selfish routing, because routing decisions are no longer based on system-wide criteria but are instead designed to optimize host-based or overlay-based metr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TCP-LP: low-priority service via end-point congestion control

    Publication Year: 2006, Page(s):739 - 752
    Cited by:  Papers (46)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB) | HTML iconHTML

    Service prioritization among different traffic classes is an important goal for the Internet. Conventional approaches to solving this problem consider the existing best-effort class as the low-priority class, and attempt to develop mechanisms that provide "better-than-best-effort" service. In this paper, we explore the opposite approach, and devise a new distributed algorithm to realize a low-prio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Modelling of TCP Enhancements in Terrestrial–Satellite Hybrid Networks

    Publication Year: 2006, Page(s):753 - 766
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (866 KB) | HTML iconHTML

    In this paper, we focus on the performance of TCP enhancements for a hybrid terrestrial-satellite network. While a large body of literature exists regarding modeling TCP performance for the wired Internet, and recently over a single-hop wireless link, the literature is very sparse on TCP analysis over a hybrid wired-wireless (multi-hop) path. We seek to make a contribution to this problem (where t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collected experience from implementing RSVP

    Publication Year: 2006, Page(s):767 - 778
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (391 KB) | HTML iconHTML

    Internet quality of service (QoS) is still a highly debated topic for more than fifteen years. Even with the large variety of QoS proposals and the impressive research advances, there is little deployment yet of network layer QoS technology. One specific problem domain is QoS signalling, which has recently attracted increasing attention to bring forward new standardization approaches. In this pape... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incremental deployment strategies for router-assisted reliable multicast

    Publication Year: 2006, Page(s):779 - 792
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1049 KB) | HTML iconHTML

    Incremental deployment of a new network service or protocol is typically a hard problem, especially when it has to be deployed at the routers. First, an incrementally deployable version of the protocol may be needed. Second, a systematic study of the performance impact of incremental deployment is needed to evaluate potential deployment strategies. Choosing the wrong strategy can be disastrous, as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An address-light, integrated MAC and routing protocol for wireless sensor networks

    Publication Year: 2006, Page(s):793 - 806
    Cited by:  Papers (49)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (672 KB) | HTML iconHTML

    We propose an address-light, integrated MAC and routing protocol (abbreviated AIMRP) for wireless sensor networks (WSNs). Due to the broad spectrum of WSN applications, there is a need for protocol solutions optimized for specific application classes. AIMRP is proposed for WSNs deployed for detecting rare events which require prompt detection and response. AIMRP organizes the network into concentr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • UPCF: a new point coordination function with QoS and power management for multimedia over wireless LANs

    Publication Year: 2006, Page(s):807 - 820
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1347 KB) | HTML iconHTML

    In this paper, we propose a new novel polling-based medium access control protocol, named UPCF (Unified Point Coordination Function), to provide power conservation and quality-of-service (QoS) guarantees for multimedia applications over wireless local area networks. Specifically, UPCF has the following attractive features. First, it supports multiple priority levels and guarantees that high-priori... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Closed-loop architecture and protocols for rapid dynamic spreading gain adaptation in CDMA networks

    Publication Year: 2006, Page(s):821 - 834
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (907 KB) | HTML iconHTML

    We present a closed-loop architecture and protocols for rapid dynamic spreading gain adaptation and fast feedback between a transmitter and a receiver communicating with each other in CDMA networks. These protocols and architecture do not require the transfer of an explicit control message indicating the change of CDMA spreading gain from transmitter to receiver. Also, with these protocols, the tr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic quorum policy for maximizing throughput in limited information multiparty MAC

    Publication Year: 2006, Page(s):835 - 848
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (401 KB) | HTML iconHTML

    In multiparty MAC, a sender needs to transmit each packet to a set of receivers within its transmission range. Bandwidth efficiency of wireless multiparty MAC can be improved substantially by exploiting the fact that several receivers can be reached at the MAC layer by a single transmission. Multiparty communication, however, requires new design paradigms since systematic design techniques that ha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MiFi: a framework for fairness and QoS assurance for current IEEE 802.11 networks with multiple access points

    Publication Year: 2006, Page(s):849 - 862
    Cited by:  Papers (18)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB) | HTML iconHTML

    In this paper, we present a framework for providing fair service and supporting quality of service (QoS) requirements in IEEE 802.11 networks with multiple access points (APs). These issues becomes critical as IEEE 802.11 wireless LAN are widely deployed in nationwide networks, linking tens of thousands of "hot-spots" for providing both real-time (voice) and non real-time (data) services to a larg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A TCAM-based distributed parallel IP lookup scheme and performance analysis

    Publication Year: 2006, Page(s):863 - 875
    Cited by:  Papers (55)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (862 KB) | HTML iconHTML

    Using ternary content addressable memory (TCAM) for high-speed IP address lookup has been gaining popularity due to its deterministic high performance. However, restricted by the slow improvement of memory accessing speed, the route lookup engines for next-generation terabit routers demand exploiting parallelism among multiple TCAM chips. Traditional parallel methods always incur excessive redunda... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network classless time protocol based on clock offset optimization

    Publication Year: 2006, Page(s):876 - 888
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB) | HTML iconHTML

    Time synchronization is critical in distributed environments. A variety of network protocols, middleware and business applications rely on proper time synchronization across the computational infrastructure and depend on the clock accuracy. The Network Time Protocol (NTP) is the current widely accepted standard for synchronizing clocks over the Internet. NTP uses a hierarchical scheme in order to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A joint-ONU interval-based dynamic scheduling algorithm for Ethernet passive optical networks

    Publication Year: 2006, Page(s):889 - 899
    Cited by:  Papers (30)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (793 KB) | HTML iconHTML

    This paper proposes a new dynamic bandwidth allocation system for Ethernet Passive Optical Networks (EPONs), subject to requirements of fairness, efficiency, and cost. An Optical Line Terminal (OLT)-centric bandwidth allocation model is proposed which employs a credit pooling technique combined with a weighted-share policy to partition the upstream bandwidth among different classes of service, and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Demand assigned capacity management (DACM) in IP over optical (IPO) networks

    Publication Year: 2006, Page(s):900 - 913
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1017 KB) | HTML iconHTML

    The demand assigned capacity management (DACM) problem in IP over optical (IPO) network aims at devising efficient bandwidth replenishment schedules from the optical domain conditioned upon traffic evolution processes in the IP domain. A replenishment schedule specifies the location, sizing, and sequencing of link capacity expansions to support the growth of Internet traffic demand in the IP netwo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A general approach for all-to-all routing in multihop WDM optical networks

    Publication Year: 2006, Page(s):914 - 923
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB) | HTML iconHTML

    WDM optical networks provide unprecedented high speed and reliability for message transfer among the nodes. All-to-all routing is a fundamental routing problem in such networks and has been well studied on single hop WDM networks. However, the number of wavelengths to realize all-to-all routing on the single hop model typically is very large. One way to reduce the number of wavelengths is to use k... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE order form for reprints

    Publication Year: 2006, Page(s): 924
    Request permission for commercial reuse | PDF file iconPDF (354 KB)
    Freely Available from IEEE
  • IEEE/ACM Transactions on Networking society information

    Publication Year: 2006, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE/ACM Transactions on Networking’s high-level objective is to publish high-quality, original research results derived from theoretical or experimental exploration of the area of communication/computer networking.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Eytan Modiano
Laboratory for Information and Decision Systems
Massachusetts Institute of Technology