By Topic

Communications Surveys & Tutorials, IEEE

Issue 3 • Date 3rd Quarter 2009

Filter Results

Displaying Results 1 - 10 of 10
  • Third Quarter 2009 IEEE Communications Surveys and Tutorials

    Page(s): 1 - 3
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (115 KB) |  | HTML iconHTML  

    Welcome to the third issue of 2009 of the IEEE Communications Surveys and Tutorials. Paper in this issue survey the research effort in several areas such as security in web service, autonomic network management, Internet traffic classification, network survivability, ad hoc MAC protocols, resource management and location awareness in wireless networks, communications in mines and the design of smart cards. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XML and Web Services Security Standards

    Page(s): 4 - 21
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (749 KB) |  | HTML iconHTML  

    XML and Web services are widely used in current distributed systems. The security of the XML based communication, and the Web services themselves, is of great importance to the overall security of these systems. Furthermore, in order to facilitate interoperability, the security mechanisms should preferably be based on established standards. In this paper we provide a tutorial on current security standards for XML and Web services. The discussed standards include XML Signature, XML Encryption, the XML Key Management Specification (XKMS), WS-Security, WS-Trust, WS-SecureConversation, Web Services Policy, WS-SecurityPolicy, the eXtensible Access Control Markup Language (XACML), and the Security Assertion Markup Language (SAML). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Autonomic Network Management: an Analysis of Current and Future Research Directions

    Page(s): 22 - 36
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (340 KB) |  | HTML iconHTML  

    Autonomic network management is an innovative vision promising new horizons of efficient networking systems free from human control. This promise has, thus far, ushered in enormous yet dispersed research contributions in both industry and academia. The work presented in this article aims at putting these efforts into perspective deriving a more holistic view of the literature in this area. We analyze the requirements and the main contributions for the building blocks of any autonomic network management system (ANMS). We then describe a coherent classification methodology to compare existing ANMS architectures. Based on this analysis, we suggest a reference framework and highlight some open challenges and describe new research opportunities. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey on Internet Traffic Identification

    Page(s): 37 - 52
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1412 KB) |  | HTML iconHTML  

    The area of Internet traffic measurement has advanced enormously over the last couple of years. This was mostly due to the increase in network access speeds, due to the appearance of bandwidth-hungry applications, due to the ISPs' increased interest in precise user traffic profile information and also a response to the enormous growth in the number of connected users. These changes greatly affected the work of Internet service providers and network administrators, which have to deal with increasing resource demands and abrupt traffic changes brought by new applications. This survey explains the main techniques and problems known in the field of IP traffic analysis and focuses on application detection. First, it separates traffic analysis into packet-based and flow-based categories and details the advantages and problems for each approach. Second, this work cites the techniques for traffic analysis accessible in the literature, along with the analysis performed by the authors. Relevant techniques include signature-matching, sampling and inference. Third, this work shows the trends in application classification analysis and presents important and recent references in the subject. Lastly, this survey draws the readers' interest to open research topics in the area of traffic analysis and application detection and makes some final remarks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey on the p-Cycle Protection Method

    Page(s): 53 - 70
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (413 KB) |  | HTML iconHTML  

    This paper presents a comprehensive survey for the pre-configured cycle (p-cycle) protection method which is a relatively new scheme for network survivability with many interesting properties, and has been attracting quite a lot of attention. We review different aspects of p-cycles and survey the studies on this and other related survivability schemes. This survey paper is the first attempt to present a rapid overview of this interesting subject and provide and agile reference of the broad p-cycle topic. In addition to addressing the concepts and preliminaries, this survey covers advanced topics related to p-cycles such as path protecting p-cycles, availability-aware design with p-cycles, p-cycle reconfiguration, column generation approach for p-cycle network design and p-cycles in multicast networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Spatial Reuse in Multihop Wireless Networks - A Survey

    Page(s): 71 - 91
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (557 KB) |  | HTML iconHTML  

    In multihop wireless ad-hoc networks, the medium access control (MAC) protocol plays a key role in coordinating the access to the shared medium among wireless nodes. Currently, the distributed coordination function (DCF) of the IEEE 802.11 is the dominant MAC protocol for both wireless LANs and wireless multihop ad hoc environment due to its simple implementation and distributed nature. The current access method of the IEEE 802.11 does not make efficient use of the shared channel due to its conservative approach in assessing the level of interference; this in turn affects the spatial reuse of the limited radio resources and highly affect the achieved throughput of a multihop wireless network. This paper surveys various methods that have been proposed in order to enhance the channel utilization by improving the spatial reuse. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Radio Resource Allocation Algorithms for the Downlink of Multiuser OFDM Communication Systems

    Page(s): 92 - 106
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (952 KB) |  | HTML iconHTML  

    This article surveys different resource allocation algorithms developed for the downlink of multiuser OFDM wireless communication systems. Dynamic resource allocation algorithms are categorized into two major classes: margin adaptive (MA) and rate adaptive (RA). The objective of the first class is to minimize the total transmit power with the constraint on users' data rates whereas in the second class, the objective is to maximize the total throughput with the constraints on the total transmit power as well as users' data rates. The overall performance of the algorithms are evaluated in terms of spectral efficiency and fairness. Considering the trade-off between these two features of the system, some algorithms attempt to reach the highest possible spectral efficiency while maintaining acceptable fairness in the system. Furthermore, a large number of RA algorithms considers rate proportionality among the users and hence, are categorized as RA with constrained-fairness. Following the problem formulation in each category, the discussed algorithms are described along with their simplifying assumptions that attempt to keep the performance close to optimum but significantly reduce the complexity of the problem. It is noted that no matter which optimization method is used, in both classes, the overall performance is improved with the increase in the number of users, due to multiuser diversity. Some on-going research areas are briefly discussed throughout the article. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey on TOA Based Wireless Localization and NLOS Mitigation Techniques

    Page(s): 107 - 124
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1661 KB) |  | HTML iconHTML  

    Localization of a wireless device using the time-of-arrivals (TOAs) from different base stations has been studied extensively in the literature. Numerous localization algorithms with different accuracies, computational complexities, a-priori knowledge requirements, and different levels of robustness against non-line-of-sight (NLOS) bias effects also have been reported. However, to our best knowledge, a detailed unified survey of different localization and NLOS mitigation algorithms is not available in the literature. This paper aims to give a comprehensive review of these different TOA-based localization algorithms and their technical challenges, and to point out possible future research directions. Firstly, fundamental lower bounds and some practical estimators that achieve close to these bounds are summarized for line-of-sight (LOS) scenarios. Then, after giving the fundamental lower bounds for NLOS systems, different NLOS mitigation techniques are classified and summarized. Simulation results are also provided in order to compare the performance of various techniques. Finally, a table that summarizes the key characteristics of the investigated techniques is provided to conclude the paper. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Underground Mine Communications: A Survey

    Page(s): 125 - 142
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (888 KB) |  | HTML iconHTML  

    After a recent series of unfortunate underground mining disasters, the vital importance of communications for underground mining is underlined one more time. Establishing reliable communication is a very difficult task for underground mining due to the extreme environmental conditions. Until now, no single communication system exists which can solve all of the problems and difficulties encountered in underground mine communications. However, combining research with previous experiences might help existing systems improve, if not completely solve all of the problems. In this survey, underground mine communication is investigated. Major issues which underground mine communication systems must take into account are discussed. Communication types, methods, and their significance are presented. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software and Hardware Issues in Smart Card Technology

    Page(s): 143 - 152
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (584 KB) |  | HTML iconHTML  

    An efficient and strongly secure smart card mechanism involves the use of a technological background taken from the fields of computers, VLSI design and material science. The result of such a mixture is a miniature, fully operational, computation system. The nature of the data involved in smart card transactions and smart card intended uses, introduce another important factor in the smart card design mechanism which is security. The evolution of VLSI technology allows the efficient implementation of costly cryptographic operations in the smart card design methodology. Apart from the traditional cryptographic algorithms, additional techniques and special design materials have been introduced in order to protect the smart card system from cryptanalytic attacks. New architectures of software design, like object-oriented programming, give the opportunity to implement programmable multi-application cards. Thus, smart cards are transformed into highly secure devices and their establishment in the modern computer market can be considered certain. This establishment is bound to finance upcoming research in smart cards so that this product can become the basic component of electronic commerce worldwide. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Communications Surveys & Tutorials is an online journal published by the IEEE Communications Society for tutorials and surveys covering all aspects of the communications field. Telecommunications technology is progressing at a rapid pace, and the IEEE Communications Society is committed to providing researchers and other professionals the information and tools to stay abreast.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Ekram Hossain, Ph.D., P.Eng.
Professor
University of Manitoba