By Topic

IEEE Network

Issue 4 • Date July-August 2010

Filter Results

Displaying Results 1 - 13 of 13
  • IEEE Network - Front cover

    Publication Year: 2010, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (232 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Science fiction becomes reality

    Publication Year: 2010, Page(s):2 - 3
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (1192 KB) | HTML iconHTML
    Freely Available from IEEE
  • Future internet services and applications

    Publication Year: 2010, Page(s):4 - 5
    Cited by:  Papers (3)
    Request permission for commercial reuse | PDF file iconPDF (397 KB) | HTML iconHTML
    Freely Available from IEEE
  • In-network services for customization in next-generation networks

    Publication Year: 2010, Page(s):6 - 12
    Cited by:  Papers (15)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (634 KB) | HTML iconHTML

    The design of the current Internet lacks in adaptability to accommodate novel network uses and functional requirements. It is therefore important to explore how new services can be introduced into the network infrastructure. We present a novel network architecture that can accommodate the deployment and custom instantiation of such network services. We discuss the motivation for our design and sev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy and security for online social networks: challenges and opportunities

    Publication Year: 2010, Page(s):13 - 18
    Cited by:  Papers (50)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (155 KB) | HTML iconHTML

    Online social networks such as Facebook, Myspace, and Twitter have experienced exponential growth in recent years. These OSNs offer attractive means of online social interactions and communications, but also raise privacy and security concerns. In this article we discuss the design issues for the security and privacy of OSNs. We find there are inherent design conflicts between these and the tradit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward publicly auditable secure cloud data storage services

    Publication Year: 2010, Page(s):19 - 24
    Cited by:  Papers (87)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (537 KB) | HTML iconHTML

    Cloud computing is the long dreamed vision of computing as a utility, where data owners can remotely store their data in the cloud to enjoy on-demand high-quality applications and services from a shared pool of configurable computing resources. While data outsourcing relieves the owners of the burden of local data storage and maintenance, it also eliminates their physical control of storage depend... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application-specific resource provisioning for wide-area distributed computing

    Publication Year: 2010, Page(s):25 - 34
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    Some modern distributed applications require cooperation among multiple geographically separated computing facilities to perform intensive computing at the end sites and large-scale data transfers in the wide area network. It has been widely recognized that WDM networks are cost-effective means to support data transfers in this type of data-intensive applications. However, neither the traditional ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Random linear network coding for peer-to-peer applications

    Publication Year: 2010, Page(s):35 - 39
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (190 KB) | HTML iconHTML

    Random linear network coding has been demonstrated to be able to improve the performance of many peer-to-peer applications, such as content distribution, multimedia streaming, distributed storage, and wireless communications. We first survey recent research progress in applying RLNC in P2P content distribution and multimedia streaming, respectively. We then study the pollution attack, a primary ty... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding peer distribution in the global internet

    Publication Year: 2010, Page(s):40 - 44
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3273 KB) | HTML iconHTML

    The fast-growing traffic of peer-to-peer applications, most notably BitTorrent, is putting unprecedented pressure to Internet service providers. Understanding the peer distribution over the global Internet thus becomes critical toward building new generation of ISP-friendly peer-to-peer systems. There are unfortunately significant scalability and representability challenges in measuring and unders... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DOM: a scalable multicast protocol for next-generation internet

    Publication Year: 2010, Page(s):45 - 51
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    In this article we propose a scalable and efficient destination-oriented multicast protocol for next-generation Internet. With DOM, each packet carries explicit destinations information, instead of an implicit group address, to facilitate the multicast data delivery; and each router leverages the unicast IP routing table to determine necessary multicast copies and next-hop interfaces. The fundamen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Content delivery networks: a bridge between emerging applications and future IP networks

    Publication Year: 2010, Page(s):52 - 56
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (143 KB) | HTML iconHTML

    With the rapid development of network applications, the Internet has evolved from a content-based communication infrastructure to a social-based community network. The emerging applications require the Internet to preserve not only the existing advantages of simplicity and scalability, but also demand varying amounts of capability, availability, reliability, flexibility, and differentiated quality... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • G-Sense: a scalable architecture for global sensing and monitoring

    Publication Year: 2010, Page(s):57 - 64
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1469 KB) | HTML iconHTML

    The pervasiveness of cellular phones combined with Internet connectivity, GPS embedded chips, location information, and integrated sensors provide an excellent platform to collect data about the individual and its surrounding environment. As a result, new applications have recently appeared to address large-scale societal problems as well as improve the quality of life of the individual. However, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

As currently defined, IEEE Network covers the following areas: 1. network protocols and architectures, 2. Protocol design and validation, 3. Communication software and its development and test, 4. Network control and signalling, 5. network management, 6. Practical network implementations including local area networks, (LANs), metropolitan area networks (MANs), and wide  area networks, (WANs), 7. Switching and processing in integrated (voice/data) networks and network components, 8. Micro-to-host communication.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief

Neil Kato
Tohoku University, Japan
kato@it.is.tohoku.ac.jp