By Topic

IEEE Network

Issue 1 • January-February 2012

Filter Results

Displaying Results 1 - 9 of 9
  • IEEE Network

    Publication Year: 2012, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (3211 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Editor's note

    Publication Year: 2012, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (195 KB) | HTML iconHTML
    Freely Available from IEEE
  • Understanding and analyzing network traffic

    Publication Year: 2012, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (1451 KB) | HTML iconHTML
    Freely Available from IEEE
  • Probabilistic parallel measurement of network traffic at multiple locations

    Publication Year: 2012, Page(s):6 - 12
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB) | HTML iconHTML

    Measuring the per-flow traffic in large networks is very challenging due to the high performance requirements. In addition to that, if traffic is measured at multiple points in the network at the same time, it becomes necessary to merge the observations in order to obtain network-wide statistics. When doing so, packets must be accounted for only once, even if they traverse more than one measuremen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge-independent traffic monitoring: Unsupervised detection of network attacks

    Publication Year: 2012, Page(s):13 - 21
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    The philosophy of traffic monitoring for detection of network attacks is based on an acquired knowledge perspective: current techniques detect either the well-known attacks on which they are programmed to alert, or those anomalous events that deviate from a known normal operation profile or behavior. In this article we discuss the limitations of current knowledge-based strategy to detect network a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual vectors and network traffic analysis

    Publication Year: 2012, Page(s):22 - 26
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    In a high-speed network, traffic monitoring modules should be compact in size to fit into a fast but small memory (e.g., SRAM). We propose two compact algorithms for network traffic monitoring and analysis, for the purposes of per-flow traffic measurement and long-duration flow detection. The proposed schemes are based on the data structure of a virtual vector that was recently invented, but limit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterizing the gaming traffic of World of Warcraft: From game scenarios to network access technologies

    Publication Year: 2012, Page(s):27 - 34
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1678 KB) | HTML iconHTML

    Over the past decade, massively multiplayer online role-playing games have become very popular and profitable, and they have attracted millions of people to play for fun in the virtual world. In this article, we first identify the fundamental challenges in MMORPG traffic analysis. Then, we mainly focus on the impact of the application scenarios and the network access technologies on the online gam... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Issues and future directions in traffic classification

    Publication Year: 2012, Page(s):35 - 40
    Cited by:  Papers (123)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (169 KB) | HTML iconHTML

    Traffic classification technology has increased in relevance this decade, as it is now used in the definition and implementation of mechanisms for service differentiation, network design and engineering, security, accounting, advertising, and research. Over the past 10 years the research community and the networking industry have investigated, proposed and developed several classification approach... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

As currently defined, IEEE Network covers the following areas: 1. network protocols and architectures, 2. Protocol design and validation, 3. Communication software and its development and test, 4. Network control and signalling, 5. network management, 6. Practical network implementations including local area networks, (LANs), metropolitan area networks (MANs), and wide  area networks, (WANs), 7. Switching and processing in integrated (voice/data) networks and network components, 8. Micro-to-host communication.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief

Nei Kato
Tohoku University, Japan
kato@it.is.tohoku.ac.jp