By Topic

IEEE Network

Issue 3 • Date May-June 1994

Filter Results

Displaying Results 1 - 4 of 4
  • Security considerations in a network management environment

    Publication Year: 1994, Page(s):12 - 17
    Cited by:  Papers (4)  |  Patents (48)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1306 KB)

    Considers the security aspects of communication between two management processes operating in different management domains; identifies two major risks: the security of information exchanged during the management association, and control of access to the management information base (MIB); and enumerates the various threats that must be guarded against and possible methods of attack. Security techni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The role of customer-premises bandwidth management

    Publication Year: 1994, Page(s):18 - 25
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1098 KB)

    Concerns the economics of customer-premises agents that manage the bandwidth demanded by next-generation, high-speed networks. Models are proposed for the hypothetical prices of SONET and ATM telecommunication services. The ATM model builds on the SONET model, splitting the leased-line price into two components/spl mdash/a traffic-insensitive charge for port and access fees and a traffic-sensitive... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network intrusion detection

    Publication Year: 1994, Page(s):26 - 41
    Cited by:  Papers (249)  |  Patents (83)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3050 KB)

    Intrusion detection is a new, retrofit approach for providing a sense of security in existing computers and data networks, while allowing them to operate in their current "open" mode. The goal of intrusion detection is to identify unauthorized use, misuse, and abuse of computer systems by both system insiders and external penetrators. The intrusion detection problem is becoming a challenging task ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Geographic extension of HIPPI channels via high speed SONET

    Publication Year: 1994, Page(s):42 - 53
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4100 KB)

    The article first briefly reviews the relevant aspects of standard HIPPI channel operation, ad hoc serial HIPPI channel extension, and the rationale for HIPPI channel extension over WANs, and provides a description of standard STS-12c SONET (STM-4c). HIPPI over SONET encapsulation protocol, reliable flow control method and performance, and the actual implementation are then described, including ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

As currently defined, IEEE Network covers the following areas: 1. network protocols and architectures, 2. Protocol design and validation, 3. Communication software and its development and test, 4. Network control and signalling, 5. network management, 6. Practical network implementations including local area networks, (LANs), metropolitan area networks (MANs), and wide  area networks, (WANs), 7. Switching and processing in integrated (voice/data) networks and network components, 8. Micro-to-host communication.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief

Neil Kato
Tohoku University, Japan
kato@it.is.tohoku.ac.jp