By Topic

Communications Magazine, IEEE

Issue 4 • Date April 2010

Filter Results

Displaying Results 1 - 22 of 22
  • IEEE Communications Magazine - Front cover

    Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (281 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): 2 - 4
    Save to Project icon | Request Permissions | PDF file iconPDF (175 KB)  
    Freely Available from IEEE
  • Technical Activities: Stimulating technical content creation [The President's Page]

    Page(s): 6 - 8
    Save to Project icon | Request Permissions | PDF file iconPDF (1359 KB)  
    Freely Available from IEEE
  • Society members named to fellow grade [Society News]

    Page(s): 10 - 12
    Save to Project icon | Request Permissions | PDF file iconPDF (2619 KB)  
    Freely Available from IEEE
  • Conference calendar

    Page(s): 14
    Save to Project icon | Request Permissions | PDF file iconPDF (71 KB)  
    Freely Available from IEEE
  • New products

    Page(s): 16
    Save to Project icon | Request Permissions | PDF file iconPDF (164 KB)  
    Freely Available from IEEE
  • Gobal Communications Newsletter

    Page(s): 1 - 4
    Save to Project icon | Request Permissions | PDF file iconPDF (910 KB)  
    Freely Available from IEEE
  • Design and implementations series V: IMS applications and support [Series Editorial]

    Page(s): 24 - 25
    Save to Project icon | Request Permissions | PDF file iconPDF (151 KB)  
    Freely Available from IEEE
  • IMS service development API and testbed

    Page(s): 26 - 32
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (689 KB) |  | HTML iconHTML  

    The IP multimedia subsystem defined by the Third Generation Partnership Project is the architecture merging the Internet and telecom worlds. The IMS was designed to make it easy for third-party developers to make their applications available to all IMS users, and by doing so provide more than only the basic telecom services like voice, messaging, presence and contact management. However, good knowledge of the IMS network architecture and the underlying Internet protocols is still needed to develop IMS applications. In addition, telecom expertise is needed to deploy the application and provision users. To ease the development and deployment process, it is essential to provide application developers with APIs and similar tools available for Web 2.0 application development today. In this article we explore the architectural and protocol aspects that enable third-party IMS application development and deployment. We also study how the applications will coexist with other applications already deployed in the IMS. Moreover, we describe Java libraries exploiting the functionality of the IMS both in the terminal client and within the core network. We also show how these Java libraries can be used for developing and deploying new applications in an IMS testbed, which provides IMS functionality over commercial 3G networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deployment of contextual corporate telco services based on protocol adaptation in the NGN environment

    Page(s): 34 - 40
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (195 KB) |  | HTML iconHTML  

    Deployment of contextual services is usually constrained to specific areas where contextual behavior can be obtained, mainly due to coverage limitations of context acquisition devices. Although end customers highly appreciate contextual services, those limitations make such services difficult to commercialize. In this article we present a practical deployment of a contextual service offered by a convergent telecommunications operator, whose functionality is to provide intelligent context-based call routing and rerouting, orchestrated from the operator's service layer. It is based on IMS control layer capabilities to properly capture the situation of the end user in a ubiquitous coverage area. The user's context is stored in a network-centric element in order to leverage that information across different services, optimizing the system by increasing the quality of the information captured and processed. This implementation proves that value-added contextual services may be built efficiently today using available products and protocols. Since contextual services will likely be a valuable part of a service provider's portfolio, this implementation can help creators of new contextual services to meet cost and time-to-market objectives. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design and implementation of architectural components for the integration of the IP multimedia subsystem and wireless sensor networks

    Page(s): 42 - 50
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (255 KB) |  | HTML iconHTML  

    The IP multimedia subsystem is becoming the de facto standard for IP-based multimedia services, while wireless sensor networks are gaining in popularity due to their ability to capture a rich set of contextual information. Integrating the sensing capabilities of WSNs in the IMS can open the door to a wide range of context-aware applications in areas such as wireless healthcare and pervasive gaming. We have previously proposed a presence-based architecture for WSN/IMS integration. This architecture relies on two key components: a WSN/IMS gateway acting as an interworking unit between WSNs and the IMS; and an extended presence server serving as a context information management node in the core network. In this article we focus on the design and implementation of these two components. Furthermore, two applications (a pervasive game and a personalized call control application) are used to concretely show how new applications can be developed using our architecture. Performance has also been evaluated. Several important findings were made in the course of this work; one is that the IMS integration with a large and evolving variety of WSNs may be a never-ending endeavor - the gateway requiring constant upgrading due to the lack of standard APIs for the interaction with sensors produced by different vendors. Another finding is that while the introduction of context as an application building block in the IMS ensures the availability of additional contextual information in the network and enables fast and easy development of context-aware applications, the lack of mature IMS application development toolkits remains a roadblock. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Broadband internet in EU countries: limits to growth

    Page(s): 52 - 57
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (226 KB) |  | HTML iconHTML  

    This article provides an analysis of broadband Internet diffusion in 27 countries of the European Union. It proposes a simple model of its growth and identifies the theoretical growth limits in each country. Some aspects of the European i2010 project implementation are presented, discussed, and compared with the model. Comments on bottlenecks and major barriers in the broadband Internet diffusion process are also offered. The existing digital gaps are irreducible in some cases and will exist as long as the current development conditions continue. The approach and analysis method proposed here may be useful in examining limits of other services or in other regions during the planning, design, implementation, and performance tracking stages of existing or new services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service traffic management system for multiservice IP networks: lessons learned and applications

    Page(s): 58 - 65
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (999 KB) |  | HTML iconHTML  

    Next-generation networks offer new opportunities and challenges to Internet service providers as well as providers of other online services. Service providers can now deploy new services over an IP network infrastructure without building their own networks. In an open network environment, the network resources of ISPs should be fairly open to third parties that plan to launch their own services over the network. To actively respond to the changing network paradigm, it is essential to measure the traffic of individual services, and to estimate their cost for cost accounting between service provider and ISP. However, current traffic measurement techniques only provide the total traffic volume in links, without reporting the operator whose services flow through the links. Some commercial products can classify traffic into each application at a specific spot, but we should install monitoring systems at every spot throughout the entire network in order to observe which service traffic flows in every link. To satisfy the requirements of the NGN environment, we developed the Service Traffic Management System that can analyze the traffic of individual services based on user log data. STMS can report not only the traffic of individual services in every link, but also user behavior for each service. In addition, this article shares our experience of STMS development. We also introduce how we utilize STMS in IP network design, and discuss business and management support. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Safety assurance and rescue communication systems in high-stress environments: A mining case study

    Page(s): 66 - 73
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1326 KB) |  | HTML iconHTML  

    Effective communication is critical to the success of response and rescue operations; however, unreliable operation of communication systems in high-stress environments is a significant obstacle to achieving this. The contribution of this article is threefold. First, it outlines those common characteristics that impair communication in high-stress environments and then evaluates their importance, specifically in the underground mine environment. Second, it discusses current underground mine communication techniques and identifies their potential problems. Third, it explores the design of wireless sensor network based communication and location sensing systems that could potentially address current challenges. Finally, preliminary results are presented of an empirical study of communication using a WSN constructed from commercially available wireless sensor nodes in an underground mine near Parkes, New South Wales, Australia. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Topics in integrated circuits for communications [Series Editorial]

    Page(s): 74 - 75
    Save to Project icon | Request Permissions | PDF file iconPDF (312 KB)  
    Freely Available from IEEE
  • Video encoder design for high-definition 3D video communication systems

    Page(s): 76 - 86
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1092 KB) |  | HTML iconHTML  

    VLSI realization of video compression is the key to real-time high-definition 3D communication systems. The newly established multiview video coding standard, as an extension profile of H.264/AVC, draws more and more attention for its high compression ratio and free-viewpoint support. Besides providing the 3D experience, multiview video can also give users complete scene perception. However, the multiple-viewpoint throughput requirement of MVC increase the complexity and hardware cost dramatically. The system memory bandwidth, on-chip memory size, and processing data throughput of each module all need to be optimized in an MVC encoder. Therefore, efficient hardware solutions for MVC architecture design are needed. In this article an overview of 3D video coding standards developments and design challenges of an MVC encoder are discussed. Then the algorithm and architecture optimization schemes are proposed. For the trade-off between system memory bandwidth and on-chip memory size, a cache-based prediction engine is proposed to ease both design challenges. Moreover, the hybrid open-close loop intra prediction scheme and the frame-parallel pipeline-doubled dual CABAC solve the throughput requirement problem. At the end of this article, based on all the proposed solutions, a prototype single-chip MVC encoder design with processing ability of 4096 × 2160 single-view to 1280 × 720 seven-view is presented. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An embedded 65 nm CMOS baseband IQ 48 MHz-1 GHz dual tuner for DOCSIS 3.0

    Page(s): 88 - 97
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1723 KB) |  | HTML iconHTML  

    An embedded CMOS digital dual tuner for DOCSIS 3.0 and set-top box applications is presented. The dual tuner down-converts a total of ten 6 MHz Annex B channels or eight 8 MHz Annex A channels, for a maximum data rate of 320 Mb/s in Annex B and 400 Mb/s in Annex A mode. The dual tuner exceeds all the stringent SCTE 40 specifications over the 48-1004 MHz bandwidth, without using any external components or SAW filters. Enabling technologies are a harmonic rejection front-end, a low-noise high-frequency resolution PLL, and digital image rejection. To our knowledge this is the first reported multichannel broadband tuner embedded in a DOCSIS 3.0 System on a chip implemented in 65 nm pure digital CMOS technology. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrated electronic system design for an implantable wireless batteryless blood pressure sensing microsystem

    Page(s): 98 - 104
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1893 KB) |  | HTML iconHTML  

    A wireless, batteryless, less invasive blood pressure sensing microsystem based on an instrumented circular cuff has been developed for advanced biological research. The proposed sensing technique avoids vessel penetration and substantially minimizes vessel restriction due to the soft cuff elasticity. The integrated electronic system design is presented with emphases on the design trade-off and system considerations. The measurement results demonstrate full functionality of the microsystems with real-time high-fidelity blood pressure sensing capability under wireless data telemetry and adaptive RF powering conditions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power line communication networks for large-scale control and automation systems

    Page(s): 106 - 113
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (193 KB) |  | HTML iconHTML  

    Power line communications uses the existing power line infrastructure for communication purposes. While the majority of recent contributions have discussed PLC for high-data-rate applications like Internet access or multimedia communication serving a relatively small number of users, in this article we are concerned with PLC as an enabler for sensing, control, and automation in large systems comprising tens or even hundreds of components spread over relatively wide areas. Typical examples of such systems are energy management (Smart Grid) and facility automation systems. We provide a discussion of the communication network requirements common to such systems and present transmission concepts for PLC to make use of the existing infrastructure resources (i.e., power lines) to meet these requirements. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IMS-Compliant management of vertical handoffs for mobile multimedia session continuity

    Page(s): 114 - 121
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (267 KB) |  | HTML iconHTML  

    The recent advances in wireless client devices and the crucial role of multimedia communications in our society have motivated relevant standardization efforts, such as the IP multimedia subsystem, to support session control, mobility, and interoperability in all-IP next-generation networks. IMS has already driven the design of commercial mobile multimedia, but exhibits limited support for service continuity during handoffs. In particular, it omits advanced techniques to reduce/eliminate handoff delays, especially during vertical handoffs (i.e., change of the wireless technology employed by a client to access the wired Internet, e.g., from UMTS to WiFi). We propose an original solution for session continuity based on the primary design guideline of cleanly and effectively separating the signaling plane (for session reconfiguration via SIP) from the media delivery plane (data transmission and related handoff management operations). Our optimized handoff management techniques exploit terminal-based decentralized predictions to minimize service-level handoff delays. Different from other recent related work, our proposal fully complies with the standard IMS infrastructure and works at the application level. The reported experimental results point out that our solution, available as an open source tool for the IMS community, reduces playout interruption times relevantly by introducing a limited and scalable signaling overhead. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reputation estimation and query in peer-to-peer networks

    Page(s): 122 - 127
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (603 KB) |  | HTML iconHTML  

    Many peer-to-peer systems assume that peers are cooperative to share and relay data. But in the open environment of the Internet, there may be uncooperative malicious peers. To detect malicious peers or reward well behaved ones, a reputation system is often used. In this article we give an overview of P2P reputation systems and investigate two fundamental issues in the design: reputation estimation and query. We classify the state-of-the-art approaches into several categories and study representative examples in each category. We also qualitatively compare them and outline open issues for future research. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advertisers' index

    Page(s): 128
    Save to Project icon | Request Permissions | PDF file iconPDF (57 KB)  
    Freely Available from IEEE

Aims & Scope

IEEE Communications Magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications systems (PCS), ISDN, and more.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Osman Gebizlioglu
Huawei Technologies