Scheduled System Maintenance:
On May 6th, single article purchases and IEEE account management will be unavailable from 8:00 AM - 5:00 PM ET (12:00 - 21:00 UTC). We apologize for the inconvenience.
By Topic

Communications Magazine, IEEE

Issue 8 • Date Aug. 2002

Filter Results

Displaying Results 1 - 16 of 16
  • Technology and communications strategy at the Athens 2004 olympic games

    Publication Year: 2002 , Page(s): 30 - 31
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (211 KB) |  | HTML iconHTML  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Telecommunications regulation in Croatia

    Publication Year: 2002 , Page(s): 31
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (107 KB) |  | HTML iconHTML  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Can the Baltic region meet the challenge of globalization, digitalization, and partnerships?

    Publication Year: 2002 , Page(s): 32
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (103 KB) |  | HTML iconHTML  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guest editorial: technology advances for 3G and beyond

    Publication Year: 2002 , Page(s): 36 - 37
    Save to Project icon | Request Permissions | PDF file iconPDF (171 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Guest editorial: in-home networking

    Publication Year: 2002 , Page(s): 68 - 69
    Save to Project icon | Request Permissions | PDF file iconPDF (143 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Digital device manuals for the management of ConnectedSpaces

    Publication Year: 2002 , Page(s): 78 - 85
    Cited by:  Papers (2)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (584 KB) |  | HTML iconHTML  

    An increasing number of devices that can be monitored and controlled via the Internet have begun to appear in the commercial domain. Health care devices, such as heart rate monitors and dialysis machines, home and other security devices, and climate control devices, are a few of the device types that are increasingly becoming connectable to the Internet. When many such devices come together we say they form a ConnectedSpace. Many nonfunctional behavioral constraints, such as those related to safety, security, privacy, and fault tolerance, may be imposed on a ConnectedSpace. These constraints may be monitored and enforced by a centralized or distributed management algorithm. Various approaches may be used for enforcing the constraints. Digital device manuals are envisioned to capture the generic information required by the different approaches to monitor and enforce the constraints. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Device and service discovery in home networks with OSGi

    Publication Year: 2002 , Page(s): 86 - 92
    Cited by:  Papers (56)  |  Patents (11)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (528 KB) |  | HTML iconHTML  

    We present an overview of the Open Services Gateway Initiative (OSGi™) technology and its associated mechanisms for accessing devices. A technical description of work currently underway to map various industry device and service discovery protocols to OSGi is presented, followed by an illustrative usage case for a home networking environment. Finally, the authors describe the benefits OSGi discovery technology offers in home networking and discuss potential future work in this area. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Broadband access over cable for next-generation services: a distributed switch architecture

    Publication Year: 2002 , Page(s): 116 - 124
    Cited by:  Papers (14)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (716 KB) |  | HTML iconHTML  

    The hybrid fiber coax architecture deployed by the cable service providers has been successful in capturing a substantial piece of the residential broadband access market. In the United States over five million homes connect to the Internet using DOCSIS cable modems. We describe an evolution path to enhance the HFC plant to provide, initially, Gigabit Ethernet (and eventually multi-Gigabit Ethernet) on the trunk and feeder portions, and 100 Mb/s Ethernet on the subscriber drops. This next-generation HFC network will enable cable service providers to address the vast and underserved small and medium-sized business market, as well as offer emerging applications and services to the residential market. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS issues in the converged 3G wireless and wired networks

    Publication Year: 2002 , Page(s): 44 - 53
    Cited by:  Papers (31)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (749 KB) |  | HTML iconHTML  

    The Internet evolution delineated through the last years has urged the wireless network community to support the deployment of IP multimedia services with guaranteed quality of service (QoS) in 3G wireless networks. This article copes with the interoperability between 3G wireless networks and wired next-generation IP networks, for the provision of services with an a priori known quality level over both environments. More specifically, the UMTS architecture as well as a prototypical implementation of the next-generation Internet based on DiffServ are considered. The article focuses on the mapping among the traffic classes of the two networks at the point where the networks converge, and discusses the requirements and possible solutions for their proper interworking at the signaling and user levels. Simulations prove that proper mapping among the traffic classes of each world is necessary in order to achieve the desired end-to-end traffic characteristics. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Challenges in the design high-speed clock and data recovery circuits

    Publication Year: 2002 , Page(s): 94 - 101
    Cited by:  Papers (71)  |  Patents (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (535 KB) |  | HTML iconHTML  

    This article describes the challenges in the design of monolithic clock and data recovery circuits used in high-speed transceivers. Following an overview of general issues, the task of phase detection for random data is addressed. Next, Hogge (1985), Alexander (1975), and half-rate phase detectors are introduced and their trade-offs outlined. Finally, a number of clock and data recovery architectures are presented. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Handover management for mobile nodes in IPv6 networks

    Publication Year: 2002 , Page(s): 38 - 43
    Cited by:  Papers (77)  |  Patents (8)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (482 KB) |  | HTML iconHTML  

    We analyze IPv6 handover over wireless LAN. Mobile IPv6 is designed to manage mobile nodes' movements between wireless IPv6 networks. Nevertheless, the active communications of a mobile node are interrupted until the handover completes. Therefore, several extensions to Mobile IPv6 have been proposed to reduce the handover latency and the number of lost packets. We describe two of them, hierarchical Mobile IPv6, which manages local movements into a domain, and fast handover protocol, which allows the use of layer 2 triggers to anticipate the handover. We expose the specific handover algorithms proposed by all these methods. We also evaluate the handover latency over IEEE 802.11b wireless LAN. We compare the layer 2 and layer 3 handover latency in the Mobile IPv6 case in order to show the saving of time expected by using anticipation. We conclude by showing how to adapt the IEEE 802.11b control frames to set up such anticipation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Home networking with IEEE 802.15.4: a developing standard for low-rate wireless personal area networks

    Publication Year: 2002 , Page(s): 70 - 77
    Cited by:  Papers (117)  |  Patents (9)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (625 KB) |  | HTML iconHTML  

    This article presents the IEEE 802.15.4 draft standard and its home networking applications. The main features of the standard are network flexibility, low cost, and low power consumption; the standard is suitable for many applications in the home requiring low-data-rate communications in an ad hoc self-organizing network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using path prediction to improve TCP performance in wireless/mobile communications

    Publication Year: 2002 , Page(s): 54 - 61
    Cited by:  Papers (9)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (634 KB) |  | HTML iconHTML  

    The operation of TCP in wireless mobile environments is discussed. After presenting previous efforts to ameliorate TCP performance in the considered environments, we propose a new mechanism for tackling the transmission slowdown problems caused by handovers. Our proposal is based on stochastic datagram relocation. Traffic destined to the mobile terminal is tunneled to and cached into adjacent cells according to the output of a path prediction algorithm. To reduce the associated overhead, only percentages of inbound traffic are copied to the cell's neighborhood on the basis of estimated probabilities. The time scheduling for datagram relocation is also taken into account. Simulations of the proposed architecture show substantial performance improvements for TCP traffic. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A survey on sensor networks

    Publication Year: 2002 , Page(s): 102 - 114
    Cited by:  Papers (4066)  |  Patents (26)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (990 KB) |  | HTML iconHTML  

    The advancement in wireless communications and electronics has enabled the development of low-cost sensor networks. The sensor networks can be used for various application areas (e.g., health, military, home). For different application areas, there are different technical issues that researchers are currently resolving. The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections. This article also points out the open research issues and intends to spark new interests and developments in this field. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive non-AWGN SSMA receiver

    Publication Year: 2002 , Page(s): 126 - 127
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (245 KB) |  | HTML iconHTML  

    This article deals with the issue of optimum detection of a known spread spectrum (SS) signal in nonwhite noise and/or narrowband interference. Prior to detection, the input signal is whitened according to the reciprocal of an interfering spectrum, I(z)=1/AG(z). Next, in force of the maximum likelihood (ML) principle, the replica of signal is carried through the same filter, I(z), to match it to a new signal shape. Results of simulation show a significant gain in comparison to conventional single-matched detection. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A security and usability proposal for mobile electronic commerce

    Publication Year: 2002 , Page(s): 62 - 67
    Cited by:  Papers (9)  |  Patents (17)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (499 KB) |  | HTML iconHTML  

    The possibility of making the Internet accessible via mobile telephones has generated an important opportunity for electronic commerce. The WAP was intended to become a general standard for business. Nevertheless, some deficiencies hinder its mass acceptance in e-commerce applications. End-to-end security and speed of information delivery are absolutely necessary conditions. The authors present a solution, or at least a partial solution, for this situation. Wireless is typically a more constrained environment than the Internet. The theory of constraints and mobile agent technology can contribute to a strategic improvement of the overall performance of the system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Communications Magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications systems (PCS), ISDN, and more.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Osman Gebizlioglu
Huawei Technologies