By Topic

IEEE Network

Issue 3 • Date May-June 2011

Filter Results

Displaying Results 1 - 9 of 9
  • IEEE Network

    Publication Year: 2011, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (173 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • In memoriam: Paul Baran

    Publication Year: 2011, Page(s):2 - 4
    Request permission for commercial reuse | PDF file iconPDF (217 KB) | HTML iconHTML
    Freely Available from IEEE
  • Network traffic monitoring, analysis and anomaly detection [Guest Editorial]

    Publication Year: 2011, Page(s):6 - 7
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | PDF file iconPDF (1425 KB) | HTML iconHTML
    Freely Available from IEEE
  • Experiences of Internet traffic monitoring with tstat

    Publication Year: 2011, Page(s):8 - 14
    Cited by:  Papers (69)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1693 KB) | HTML iconHTML

    Since the early days of the Internet, network traffic monitoring has always played a strategic role in understanding and characterizing users¿ activities. In this article, we present our experience in engineering and deploying Tstat, an open source passive monitoring tool that has been developed in the past 10 years. Started as a scalable tool to continuously monitor packets that flow on a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Packet traffic: a good data source for wireless sensor network modeling and anomaly detection

    Publication Year: 2011, Page(s):15 - 21
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (891 KB) | HTML iconHTML

    The wireless sensor network (WSN) has emerged as a promising technology. In WSNs, sensor nodes are distributedly deployed to collect interesting information from the environment. Because of the mission of WSNs, most node-wide as well as network-wide activities are manifested in packet traffic. As a result, packet traffic becomes a good data source for modeling sensor node as well as sensor network... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measurement and diagnosis of address misconfigured P2P traffic

    Publication Year: 2011, Page(s):22 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (158 KB) | HTML iconHTML

    Through measurement study, we discover an interesting phenomenon, P2P address misconfiguration, in which a large number of peers send P2P file downloading requests to a "random" target on the Internet. Through measuring three large datasets spanning four years and across five different /8 networks, we find address-misconfigured P2P traffic on average contributes 38.9 percent of Internet background... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic measurement-aware routing in practice

    Publication Year: 2011, Page(s):29 - 34
    Cited by:  Papers (9)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    Traffic monitoring is a critical network operation for the purpose of traffic accounting, debugging or troubleshooting, forensics, and traffic engineering. Existing techniques for traffic monitoring, however, tend to be suboptimal due to poor choice of monitor location or constantly evolving monitoring objectives and traffic characteristics. One way to counteract these limitations is to use routin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multimedia traffic security architecture for the internet of things

    Publication Year: 2011, Page(s):35 - 40
    Cited by:  Papers (76)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (747 KB) | HTML iconHTML

    An important challenge for supporting multimedia applications in the Internet of Things is the security heterogeneity of wired and wireless sensor and actuator networks. In this work, we design a new and efficient media-aware security framework for facilitating various multimedia applications in the Internet of Things. First, we present a novel multimedia traffic classification and analysis method... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

As currently defined, IEEE Network covers the following areas: 1. network protocols and architectures, 2. Protocol design and validation, 3. Communication software and its development and test, 4. Network control and signalling, 5. network management, 6. Practical network implementations including local area networks, (LANs), metropolitan area networks (MANs), and wide  area networks, (WANs), 7. Switching and processing in integrated (voice/data) networks and network components, 8. Micro-to-host communication.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief

Neil Kato
Tohoku University, Japan
kato@it.is.tohoku.ac.jp