By Topic

Communications Magazine, IEEE

Issue 8 • Date August 2008

Filter Results

Displaying Results 1 - 25 of 27
  • Front Cover - IEEE Communications Magazine

    Publication Year: 2008 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (1676 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008 , Page(s): 2 - 4
    Save to Project icon | Request Permissions | PDF file iconPDF (74 KB)  
    Freely Available from IEEE
  • Comminications: Faster-Higher-Stronger IEEE ICC 2008 in Beijing, China [The Presiden'ts Page]

    Publication Year: 2008 , Page(s): 6 - 10
    Save to Project icon | Request Permissions | PDF file iconPDF (1146 KB)  
    Freely Available from IEEE
  • Jack Howell, A Winner in Great Wall of China race [From the Editor-in-Chief]

    Publication Year: 2008 , Page(s): 12
    Save to Project icon | Request Permissions | PDF file iconPDF (579 KB)  
    Freely Available from IEEE
  • Society news

    Publication Year: 2008 , Page(s): 14
    Save to Project icon | Request Permissions | PDF file iconPDF (40 KB)  
    Freely Available from IEEE
  • The first meeting of the Industry Advisory Board [Certification Corner]

    Publication Year: 2008 , Page(s): 16
    Save to Project icon | Request Permissions | PDF file iconPDF (134 KB)  
    Freely Available from IEEE
  • Reviews of [("Identity & Security. A Common Architecture & Framework for SOA and Network Convergence", Radhakrishnan, R.; 2007; and "Network Routing: Algorithms, Protocols, and Architectures", Medhi, D. and Ramasamy, K.; 2007)]

    Publication Year: 2008 , Page(s): 18 - 19
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (296 KB) |  | HTML iconHTML  

    The following two books are reviewed: Identity & Security. A Common Architecture & Framework for SOA and Network Convergence (Radhakrishnan, R.; 2007) and Network Routing: Algorithms, Protocols, and Architectures (Medhi, D. and Ramasamy, K.; 2007). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conference Calendar

    Publication Year: 2008 , Page(s): 20
    Save to Project icon | Request Permissions | PDF file iconPDF (35 KB)  
    Freely Available from IEEE
  • New products

    Publication Year: 2008 , Page(s): 22
    Save to Project icon | Request Permissions | PDF file iconPDF (85 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Product Spotlights

    Publication Year: 2008 , Page(s): 24
    Save to Project icon | Request Permissions | PDF file iconPDF (402 KB)  
    Freely Available from IEEE
  • History of Communications

    Publication Year: 2008 , Page(s): 26 - 29
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (63 KB) |  | HTML iconHTML  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NXTCOMM 2008 in Las Vegas [Guest Editorial]

    Publication Year: 2008 , Page(s): 30
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (71 KB) |  | HTML iconHTML  

    The first article in this series describes a new photonic layer security system that may fill the gap in providing a security solution at high data rates, while the second article describes new optical burst switching (OBS) as a viable means of implementing optical communication, identifying potential threats to security in OBS networks, and alleviating the threats by providing two measures, authentication of burst headers and confidentiality of data bursts. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Overlay Photonic Layer Security Approach Scalable to 100 Gb/s

    Publication Year: 2008 , Page(s): 32 - 39
    Cited by:  Papers (6)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (769 KB) |  | HTML iconHTML  

    As data rates outpace the capabilities of electronic encryption schemes, photonic layer security may fill the gap in providing a communication security solution at high data rates. In this article we review and highlight the advantages of our proposed optical code-division multiplexed (OCDM)-based photonic layer security (PLS) system based on high-resolution control of the optical phase of tightly spaced phase locked laser lines. Such a PLS system is scaleable to 100 Gb/s and provides a protocol independent security solution. We review the use of high-resolution control of the optical phase of mode-locked laser frequency combs as an enabling technology for a new class of OCDM systems. A network based on such systems is compatible with and can have comparable spectral efficiency to existing DWDM networks. Through inverse multiplexing of 10 Gb/s tributaries, we have already demonstrated optical transmission of a 40 Gb/s aggregate OCDM signal over 400 km. Such a PLS solution is achieved through shared phase scrambling of the individual OCDM codes assigned to each of the tributaries using an integrated micro-ring resonator-based phase coder/scrambler. The confidentiality of OCDM-based PLS is robust against exhaustive, known plain text, and archival/forensic attacks, and can complement digital encryption operating at higher layers. Moreover, the integrity of the PLS solution is ensured through the inherent coupling to confidentiality, since knowledge of the key is needed in order to easily alter the transmitted data stream without introducing observable errors. This system can leverage advances in optical integration to support new applications where electronic encryption is impractical because of space, weight, power, availability, and cost requirements. Such applications range from timely security support for the emerging 100 GbE standards to all-optical multilevel security offered through the compatibility of PLS with transparent DWDM networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Optical Burst Switching: Framework and Research Directions

    Publication Year: 2008 , Page(s): 40 - 45
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (118 KB) |  | HTML iconHTML  

    Optical burst switching has been positioned as a viable means of implementing optical communication efficiently. This article identifies potential threats to security in OBS networks. To alleviate the security threats in OBS networks, a secure Optical Burst Switching (S-OBS) framework is proposed. The S-OBS framework provides two levels of security measures: authentication of burst headers and confidentiality of data bursts. Candidate solutions in each category are examined, and research directions are presented. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • D&I Series: Socializing Experiential [Guest Editorial]

    Publication Year: 2008 , Page(s): 46 - 47
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (73 KB) |  | HTML iconHTML  

    The articles in this issue cover communications technology including multimedia communication, software radio, radiofrequency microelectromechanical systems, presence network agents, and Internet telephony. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation of a Solution for the Provisioning of Converged Remote Tower and Facility Management Services over Satellite IP for Greek Heliports

    Publication Year: 2008 , Page(s): 48 - 56
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (349 KB) |  | HTML iconHTML  

    The only way to quickly provide health and disaster recovery services to the large number of isolated islands in Greece is to fly there by helicopter. For this reason, there are 46 heliports operated 24/7 by the Hellenic Civil Aviation Authority (HCAA). Unfortunately, the Greek terrain is extremely difficult as far as provisioning of telecommunication means is concerned, so connectivity with the heliports is virtually nonexistent. This leads to reduced radio coverage, especially at low altitudes, severely impairing the heliports' operational capabilities. Moreover, heliports are unmanned and unsupervised, and there is no indication as to the weather conditions there. Thus, flight controllers authorize landings/takeoffs to/from heliports, normally a life or death decision, while remaining unaware of what pilots may run into. This article presents the design and implementation of a solution to these problems, contributing to flight safety and heliport maintenance/operation procedures as well as providing a working paradigm regarding the quality of satellite communication services for other air traffic control (ATC) applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation of a Portable Software Radio

    Publication Year: 2008 , Page(s): 58 - 66
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (468 KB) |  | HTML iconHTML  

    We summarize the design and development of a portable software radio prototype built primarily using commercial off-the-shelf components and open source software. Our research group leverages these prototypes for several funded projects focusing on issues including interoperable public safety communications, cognitive wireless networks, and educational initiatives. The device components include a general-purpose processor on a small-form-factor motherboard, radio hardware, touchscreen and LCD, audio microphone and speaker, and an internal battery enabling hours of mobile operation. We describe the selection of hardware and software components, identification and modification of the operating system, and development of an application programming framework that augments the selected radio software. We discuss trade-offs in the selection of hardware and software, decisions that proved to be stable throughout the lifetime of the project, issues that arose, and lessons learned along the way. Significant advances over the past decade have made GPP-based software radio a viable solution in many areas, and this work demonstrates that today's processors are capable of enabling a new generation of software radio in portable form factor devices. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RF-MEMS for Wireless Communications

    Publication Year: 2008 , Page(s): 68 - 74
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (397 KB) |  | HTML iconHTML  

    This article presents an introduction and overview of MEMS technology with a focus on RF applications of MEMS in the design of cellular handsets. A novel, integrated, high-Q tunable digital capacitor is discussed to demonstrate how RF-MEMS technology can be utilized to make high frequency components whose RF characteristics can be adjusted during operation, allowing for the first time reconfiguration of radio hardware under software control. It is concluded that as the consumer wireless market continues to grow and evolve, product designers will remain under ever increasing pressure to develop smaller, lighter, thinner products that are more functional, energy-efficient, and intuitive, and to do so faster and at lower cost. Although issues and challenges persist, opportunities abound, and RF-MEMS technology holds the promise of being a key enabler of future generations of more highly converged, cognitive, and flexible consumer wireless products. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Presence Network Agent: A Simple Way to Improve the Presence Service

    Publication Year: 2008 , Page(s): 75 - 79
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (115 KB) |  | HTML iconHTML  

    The article examines a possible way of improving the performance of the presence service within IMS networks without modifying the presence and group management enabler. This can be achieved by means of a presence network agent (PNA). The PNA has been defined by 3GPP; it is a new logic entity within the IMS core network that is able to publish the presence information on behalf of the presentity user agent. The PNA improves performance because it reduces the presence signaling load within the radio access network without downgrading the freshness and richness of the presence information. The article's goal is to provide the reader with useful information about the PNA and our experience with PNA implementation and deployment. We first describe the PNA concept as defined by 3GPP, highlighting the open issues still present in the standardization and the possible optimizations, subsequently we present an actual implementation of a PNA handling busy/idle states for IMS calls. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Spam over Internet Telephony (SPIT) Prevention

    Publication Year: 2008 , Page(s): 80 - 86
    Cited by:  Papers (8)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (98 KB) |  | HTML iconHTML  

    Spam over IP telephony (SPIT) is expected to become a serious problem in the near future. One of the main requirements for a SPIT prevention system is to avoid the involvement of the callee in the SPIT detection process, because this implies disturbing the callee each time an unclassified potential SPIT call arrives. Further requirements include adaptability to different deployment scenarios and flexibility to quickly react to new kinds of SPIT that bypass existing prevention systems. This article analyzes the requirements for SPIT prevention, provides a systematic classification of currently known SPIT prevention methods, and introduces a reference model for SPIT prevention systems. As an instance of the reference model, we designed and implemented an advanced SPIT prevention system, composed of methods that avoid unnecessary callee interaction and adaptive in order to be customized for different scenarios. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IPTV: The Entertainment Game Has Changed [Guest Editorial]

    Publication Year: 2008 , Page(s): 88 - 89
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (148 KB) |  | HTML iconHTML  

    The articles in this feature topic illustrate some of the ways IPTV requirements are driving change to multiple parts of the infrastructure. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enabling IPTV: What's Needed in the Access Network

    Publication Year: 2008 , Page(s): 90 - 95
    Cited by:  Papers (11)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (201 KB) |  | HTML iconHTML  

    Service providers around the globe have begun commercializing triple play services to better compete with cable and satellite operators. While this is helping boost average revenue per user (ARPU), it is placing unprecedented stress on the traditional high-speed Internet infrastructure. This article examines the issues of deploying triple play services - and, more specifically, the unique demands of IPTV service delivery. It illuminates the need for a transformation of the access network architecture toward Ethernet and IP technology for a solution that can bring together access, aggregation, edge, and subscriber service delivery while addressing cost, reliability, scalability, and quality of service requirements. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extending the Service Bus for Successful and Sustainable IPTV Services

    Publication Year: 2008 , Page(s): 96 - 103
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (594 KB) |  | HTML iconHTML  

    Telecom carriers have positioned IPTV as one of the key components of triple-play (broadband, television, and voice) or quad-play (with the addition of mobility). Adoption of Web services within a SOA framework as building blocks for developing complex media workflows is an important step toward reuse of media processing tools in an IPTV environment. A Web services approach also provides the capability to abstract network-based services for creation of composite services that can be executed in an IPTV environment. At the same time, adoption of a service bus provides a single point of integration for multiple services, and common features such as service registry and discovery, reliable message delivery, and transformation in a heterogeneous production environment. In this article we present an approach of media enabling the service bus to support offline digital media processes and composite service execution in an IPTV production environment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative Coded Video Multicast for IPTV Services under EPON-WiMAX Integration

    Publication Year: 2008 , Page(s): 104 - 110
    Cited by:  Papers (8)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (143 KB) |  | HTML iconHTML  

    This article introduces a novel framework of cooperative coded video multicast (CCVM) for provisioning IPTV services in metropolitan area access networks based on the emerging integration of Ethernet passive optical networks and WiMAX. The framework of CCVM is formed through the central coordination and synchronization at the optical line terminal and advanced coding techniques across different system layers. A cross-layer design of video multicasting on a single ONU-BS is first introduced for dealing with the multi-user channel diversity and short-term channel fluctuations, where the scalable video coding with multiple description coding (MDC) at the source and physical layer superposition coding techniques at the channel are jointly considered. This approach is further extended into the scenario that involves multiple ONU-BSs for cooperative communications to tackle intercell interference. Finally, the efficiency of the proposed framework is demonstrated via a case study on the employment of CCVM strategy under the collaboration of multiple distributed ONU-BSs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adoption and Pricing: The Underestimated Elements of a Realistic IPTV Business Case

    Publication Year: 2008 , Page(s): 112 - 118
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (101 KB) |  | HTML iconHTML  

    The adoption of IPTV increases competition for telecom operators. Especially video on demand and the move to HDTV push the bandwidth requirements to the limits. It is very challenging for an operator to construct a successful and sustainable introduction of IPTV over the existing infrastructure. This article gives an overview of a typical business case followed by a detailed discussion of the adoption and evaluation of the outcome. The results of this article indicate the importance of a correct choice of adoption model and related parameters. It illustrates how different IPTV-specific effects on adoption (i.e., competition and analog switch off) might have a considerable impact on the outcome. After adoption, the article shows how the outcome of the business case can be used within pricing decisions by setting sustainable and competitive boundaries on the tariff. Finally, as pricing will also have an important impact on adoption (e.g., a price reduction could lead to increased adoption), the possible impact of this feedback loop is indicated. In this sense the approach discussed in the article could easily be extended with a highly detailed cost model of the network architecture and technology, leading to a full business case for IPTV introduction by a telecom operator. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Communications Magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications systems (PCS), ISDN, and more.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Osman Gebizlioglu
Huawei Technologies