Scheduled System Maintenance:
On May 6th, single article purchases and IEEE account management will be unavailable from 8:00 AM - 5:00 PM ET (12:00 - 21:00 UTC). We apologize for the inconvenience.
By Topic

Communications Surveys & Tutorials, IEEE

Issue 4 • Date Fourth Quarter 2008

Filter Results

Displaying Results 1 - 8 of 8
  • IEEE Communications Surveys & Tutorials - Fourth quarter 2008

    Publication Year: 2008 , Page(s): 1 - 2
    Save to Project icon | Request Permissions | PDF file iconPDF (68 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • News from the National Science Foundation

    Publication Year: 2008 , Page(s): 3 - 4
    Save to Project icon | Request Permissions | PDF file iconPDF (96 KB)  
    Freely Available from IEEE
  • Max-min fairness and its applications to routing and load-balancing in communication networks: a tutorial

    Publication Year: 2008 , Page(s): 5 - 17
    Cited by:  Papers (14)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (281 KB) |  | HTML iconHTML  

    This tutorial is devoted to the notion of max-min fairness (MMF), associated optimization problems, and their applications to multi-commodity flow networks.We first introduce a theoretical background for a generic MMF optimization problem and discuss its relation to lexicographic optimization. We next present resolution algorithms for convex MMF optimization, and analyze their properties. In the second half of the tutorial we discuss its applications to communication networks, in particular to routing and load-balancing. We state several properties with respect to each of the studied problems and analyze the behavior of the algorithms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A survey of multimedia streaming in wireless sensor networks

    Publication Year: 2008 , Page(s): 18 - 39
    Cited by:  Papers (70)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (381 KB) |  | HTML iconHTML  

    A wireless sensor network with multimedia capabilities typically consists of data sensor nodes, which sense, for instance, sound or motion, and video sensor nodes, which capture video of events of interest. In this survey, we focus on the video encoding at the video sensors and the real-time transport of the encoded video to a base station. Real-time video streams have stringent requirements for end-to-end delay and loss during network transport. In this survey, we categorize the requirements of multimedia traffic at each layer of the network protocol stack and further classify the mechanisms that have been proposed for multimedia streaming in wireless sensor networks at each layer of the stack. Specifically, we consider the mechanisms operating at the application, transport, network, and MAC layers. We also review existing cross-layer approaches and propose a few possible cross-layer solutions to optimize the performance of a given wireless sensor network for multimedia streaming applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From TCP/IP to convergent networks: challenges and taxonomy

    Publication Year: 2008 , Page(s): 40 - 55
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (715 KB) |  | HTML iconHTML  

    Nowadays most portable electronic devices have some sort of network capability. However, due to different power, cost and processing limitations, the choice of networking technology changes for each device. Currently, networks are converging to all-IP solutions, due to their wide applicability and low cost. However, the IP architecture is built on several design decisions that complicate the support of ubiquitous networking. In order to allow the equipment to intercommunicate even though their protocols may be different, a new set of protocols and services have been developed. This article describes the challenges and existing solutions in the area of convergent networking protocols and architectures. First, we will explore why the TCP/IP architecture is not tailored to mobile networks, briefly describing its limitations and possible solutions. Next, we will present a taxonomy to classify the architectures for convergent networking. Finally, we show a brief survey of the existing convergent architectures as well as the research challenges on the subject. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A survey of techniques for internet traffic classification using machine learning

    Publication Year: 2008 , Page(s): 56 - 76
    Cited by:  Papers (159)  |  Patents (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (442 KB) |  | HTML iconHTML  

    The research community has begun looking for IP traffic classification techniques that do not rely on `well known¿ TCP or UDP port numbers, or interpreting the contents of packet payloads. New work is emerging on the use of statistical traffic characteristics to assist in the identification and classification process. This survey paper looks at emerging research into the application of Machine Learning (ML) techniques to IP traffic classification - an inter-disciplinary blend of IP networking and data mining techniques. We provide context and motivation for the application of ML techniques to IP traffic classification, and review 18 significant works that cover the dominant period from 2004 to early 2007. These works are categorized and reviewed according to their choice of ML strategies and primary contributions to the literature. We also discuss a number of key requirements for the employment of ML-based traffic classifiers in operational IP networks, and qualitatively critique the extent to which the reviewed works meet these requirements. Open issues and challenges in the field are also discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A survey of secure mobile Ad Hoc routing protocols

    Publication Year: 2008 , Page(s): 78 - 93
    Cited by:  Papers (37)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (948 KB) |  | HTML iconHTML  

    Several routing protocols have been proposed in recent years for possible deployment of mobile ad hoc networks (MANETs) in military, government and commercial applications. In this paper, we review these protocols with a particular focus on security aspects. The protocols differ in terms of routing methodologies and the information used to make routing decisions. Four representative routing protocols are chosen for analysis and evaluation including: Ad Hoc on demand Distance Vector routing (AODV), Dynamic Source Routing (DSR), Optimized Link State Routing (OLSR) and Temporally Ordered Routing Algorithm (TORA). Secure ad hoc networks have to meet five security requirements: confidentiality, integrity, authentication, non-repudiation and availability. The analyses of the secure versions of the proposed protocols are discussed with respect to the above security requirements. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Contention avoidance and resolution schemes in bufferless all-optical packet-switched networks: a survey

    Publication Year: 2008 , Page(s): 94 - 107
    Cited by:  Papers (11)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (228 KB) |  | HTML iconHTML  

    Optical Packet Switching (OPS) is the promising switching technique to utilize the huge bandwidth offered by all-optical networks using the DWDM (Dense Wavelength Division Multiplexing) technology. However, optical packet contention is the major problem in an OPS network. Resolution and avoidance are two schemes to deal with the contention problem. A resolution scheme resolves collisions, while an avoidance scheme tries to reduce the number of potential collision events. Many OPS architectures rely on optical buffers to resolve contention. Unfortunately, optical buffering technology is still immature as it relies on bulky optical fiber delay lines. Furthermore, it requires a complex control. Therefore, a bufferless OPS network could still be the most straightforward implementation in the near future. In this article, we survey the contention resolution and avoidance schemes proposed for bufferless OPS networks. We also review the resolution and avoidance schemes that can handle the Quality of Service (QoS) issue in a QoS-capable bufferless OPS network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Communications Surveys & Tutorials is an online journal published by the IEEE Communications Society for tutorials and surveys covering all aspects of the communications field. Telecommunications technology is progressing at a rapid pace, and the IEEE Communications Society is committed to providing researchers and other professionals the information and tools to stay abreast.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Ekram Hossain, Ph.D., P.Eng.
Professor
University of Manitoba