By Topic

Network, IEEE

Issue 2 • Date March 2009

Filter Results

Displaying Results 1 - 10 of 10
  • IEEE Network - Front cover

    Publication Year: 2009 , Page(s): c1 - c2
    Save to Project icon | Request Permissions | PDF file iconPDF (1132 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (43 KB)  
    Freely Available from IEEE
  • Handover [Editor's Note]

    Publication Year: 2009 , Page(s): 2 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (76 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • New books and multimedia

    Publication Year: 2009 , Page(s): 4
    Save to Project icon | Request Permissions | PDF file iconPDF (37 KB)  
    Freely Available from IEEE
  • Dimensioning network links: a new look at equivalent bandwidth

    Publication Year: 2009 , Page(s): 5 - 10
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (133 KB) |  | HTML iconHTML  

    One of the tasks of network management is to dimension the capacity of access and backbone links. Rules of thumb can be used, but they lack rigor and precision, as they fail to reliably predict whether the quality, as agreed on in the service level agreement, is actually provided. To make better predictions, a more sophisticated mathematical setup is needed. The major contribution of this article ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality of resilience as a network reliability characterization tool

    Publication Year: 2009 , Page(s): 11 - 19
    Cited by:  Papers (14)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (206 KB) |  | HTML iconHTML  

    With the increased role of resilience in modern networks, the existing quality of service is required to be expanded with service availability and maintainability. Recently, studies have shown the strong limitation of the common availability metrics for measuring the user's quality of experience. In this article a joint specification of QoS definitions with a sophisticated service resilience chara... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless data traffic: a decade of change

    Publication Year: 2009 , Page(s): 20 - 26
    Cited by:  Papers (12)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (137 KB) |  | HTML iconHTML  

    This article presents an overview of the most significant changes in wireless data traffic and its main driving forces throughout the past decade (1998-2008). The main axes of change are discussed: wireless technology, user population, and applications. Evolution of wireless technology realized a 200-fold increase in data rate, and facilitated a continuous enrichment of the traffic mix traversing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Handover keying and its uses

    Publication Year: 2009 , Page(s): 27 - 34
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (119 KB) |  | HTML iconHTML  

    Mobile nodes must authenticate themselves in order to use network services. When mobile nodes roam into a new cell, they must re-authenticate to the new layer 2 and 3 devices. This re-authentication process can take as long as two seconds, which is unacceptable for applications such as voice over IP. In this article we present several recently developed authentication protocols that can reduce the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Media handling for multimedia conferencing in multihop cellular networks

    Publication Year: 2009 , Page(s): 35 - 42
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (111 KB) |  | HTML iconHTML  

    This article addresses the media-handling aspects of multimedia conferencing in multihop cellular networks. Participation in multimedia conferences in MCNs may be confined to either the conventional cellular network or the MANET. Participation also can span both networks. However, neither the media-handling architectures currently in use in conventional cellular networks, nor the ones in use in MA... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New adversary and new threats: security in unattended sensor networks

    Publication Year: 2009 , Page(s): 43 - 48
    Cited by:  Papers (11)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (110 KB) |  | HTML iconHTML  

    Some wireless sensor networks preclude the constant presence of a centralized data collection point, that is, a sink. In such a disconnected or unattended setting, nodes must accumulate sensed data until it can be off loaded to an itinerant sink. Furthermore, if the operating environment is hostile, there is a very real danger of node and data compromise. The unattended nature of the network makes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Network covers topics which include: network protocols and architecture; protocol design and validation; communications software; network control, signaling and management; network implementation (LAN, MAN, WAN); and micro-to-host communications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Xuemin (Sherman) Shen, PhD
Engineering University of Waterloo